E

EAL

See Evaluation Assurance Level.

eavesdropping

Any type of passive attack where you intercept data in an unauthorized manner—usually in order to find passwords. Cable sniffing and wiretapping are two types of eavesdropping attacks, as are man in the middle attacks.

ECC

See Elliptic Curve Cryptosystem.

EF

See Exposure Factor.

electromagnetic interference (EMI)

The interference that can occur during transmissions over copper cable because of electromagnetic energy outside the cable. The result is degradation of the signal.

Elliptic Curve Cryptosystem

A type of public key cryptosystem that requires a shorter key length than many other cryptosystems— including the defacto industry-standard, RSA.

EMI

See electromagnetic interference.

Encapsulating Security Payload

The ESP header is used to provide a mix of security services in IPv4 and IPv6. ESP can be used alone or in combination with the IP Authentication Header (AH).

encoding

The process of translating data into signals that can be transmitted on a transmission medium.

encryption

Converting data into a form to make it less likely to be usable to anyone intercepting it if they cannot decrypt it.

encryption key

The string of alphanumeric characters used to decrypt encrypted data.

enticement

The process of luring someone.

entrapment

The process of encouraging an attacker to perform an act, even if they don't want to do it.

enumeration

An attempt to gain information about your network by specifically targeting network resources, users and groups, and applications running on your system.

escalation

The act of moving something up in priority. Often when an incident is escalated, it is brought to the attention of the next highest supervisor. See also privilege escalation.

Ethernet

A shared-media network architecture. It operates at the Physical and Data Link layers of the OSI model. As the media access method, it uses baseband signaling over either a bus or a star topology with CSMA/CD. The cabling used in Ethernet networks can be coax, twisted-pair, or fiber-optic.

ethernet address

See MAC address.

Evaluation Assurance Level

A level of assurance, expressed as a numerical value, based upon standards set by the CCRA (Common Criteria Recognition Agreement).

event

Any noticeable action or occurrence.

exposure factor

A calculation of how much data (or other assets) could be lost from a single occurrence. If all the data on the network could be jeopardized by a single attack, the exposure factor is 100 percent.

external threats

Threats that originate from outside the company.

Extranet

Web (or similar) services set up in a private network to be accessed internally and by select external entities, such as vendors and suppliers.



CompTIA Security+ Study Guide. Exam SY0-101
Security+ Study Guide
ISBN: 078214098X
EAN: 2147483647
Year: 2006
Pages: 167

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net