E


EALs (eight assurance levels), 240–241

EAP (Extensible Authentication Protocol), 111, BC10

eavesdropping, 179, 269

EC (Elliptic Curve) algorithm, 207

ECB (Electronic Code Book), 200, BC10

E-Commerce Consultants, International Council of, 379

Economic Espionage Act, 319

ECPA (Electronic Communications Privacy Act), 319

education, for security awareness, 147

EES (Escrowed Encryption Standard), 212, BC10

EF (Exposure Factor), 142

EIA/TIA-232 standard, 80

EIA/TIA-449 standard, 80

eight assurance levels (EALs), 240–241

El Gamal algorithm, 207

electrical power, controls for, 351–352

electricity, damage from, 341–342

Electromagnetic Interference (EMI), BC10

Electronic Code Book (ECB), 200, BC10

Electronic Communications Privacy Act (ECPA), 319

Elliptic Curve (EC) algorithm, 207

e-mail security, 112–114, 212–213

emanations, 232

emergency procedures, 356

EMI (Electromagnetic Interference), BC10

employee activities, inappropriate, 255–256

employee sabotage, 254

employees, roles and responsibilities for, 135–137

employment agreements, 134

employment procedures, 357

Encapsulating Security Payload (ESP), 107, 215, BC11

encapsulation, 157, 158

encryption, 195–196, BC10

encryption standards

AES (Advanced Encryption Standard), 203, BC2

DES (Data Encryption Standard), 199–201, BC9

EES (Escrowed Encryption Standard), 212, BC10

end-to-end-encryption, 195, BC10

end-user. See user

enticement, BC11

entrapment, 327, BC11

environmental controls, 351–355

Environmental Security domain. See Physical (Environmental) Security domain

equipment failure, 342

Errors and Omissions (E&O), 253

Escrowed Encryption Standard (EES), 212, BC10

ESP (Encapsulating Security Payload), 107, 215, BC11

espionage, 254, 255, BC11

establishment (authorization), 42–43, BC3

Ethernet, BC11

Ethernet protocol, 84

ethics, 130, 333–334, BC11

“Ethics and the Internet” (IAB), 334

European Information Technology Security Evaluation Criteria (ITSEC), 239–240, BC15

evidence

admissibility of, 326–330

best evidence rule, 324, BC4

Chain of Custody (Chain of Evidence), BC6

life cycle of, 328–330, BC11

rules of, 325–326

types of, 324–325

exam. See also prep test questions in this book

breaks during, 374

description of, 16–17

language used in, 17

passing score for, 16

practice exam on CD-ROM, 13, 15, 367

preparation for, 365–370

registering for, 11–12, 365–366

results of, when to expect, 17–18

study plan for, 12–16, 366

supervising, 29

test-taking strategies for, 368–369, 371–374

travel to, 369–370

what to bring to, 372–373

writing questions for, 28–29

Exclusive Or (XOR), 201, BC30

exigent circumstances, BC11

expert systems, 161–162, BC11

Exposure Factor (EF), 142

Extensible Authentication Protocol (EAP), 111, BC10

extranet, 74, BC11




CISSP For Dummies
CISSP For Dummies
ISBN: 0470537914
EAN: 2147483647
Year: 2004
Pages: 242

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net