EAL. Evaluation Assurance Level. A numerical rating, grade, or category assigned to an IT product or system after it undergoes the Common Criteria security evaluation, an international standard. EAL indicates the degree under which the product or system has been tested or evaluated.
EAP. Extensible Authentication Protocol. An extensible and secure framework for different methods of ID/access authentication used in wireless networks and internet connections.
EAP-TLS. Extensible Authentication Protocol-Transport Layer Security. An EAP implementation that uses the Transport Layer Protocol (TLS). TLS is a cryptographic system that secures communication over a computer network, and is widely used in email, instant messaging, and HTTPS.
EBCAK. Error Between Chair and Keyboard. A variant of PEBCAK (Problem Exists Between Chair and Keyboard), referring to a technical “problem” or “issue” wherein the root cause lies with the end-user, often because of a common, easily corrected human mistake. The term can be humorous and lighthearted but may also be construed as derogatory, making its usage limited exclusively to informal conversations among technical support staff.
EBS. Elastic Block Store. A cloud-hosted data storage service offered by Amazon that comes in virtual “blocks,” which are designed to emulate traditional storage devices such as physical hard drives.
ECDH. Elliptic Curve Diffie-Hellman. A key-agreement protocol based on the Diffie-Hellman (DH) method that allows two parties in an insecure channel to establish a shared secret key.
ECDSA. Elliptic Curve Digital Signature Algorithm. A digital signature algorithm (DSA) variant that uses elliptic curve cryptography (ECC) to generate keys. ECDSA is widely used in cryptocurrency.
EDR. Endpoint Detection & Response. A set of methodologies and solutions used in cybersecurity to continually monitor network endpoints (such as desktop computers, mobile phones, tablets, and IoT devices) for cyberthreats and suspicious system activities/behaviour for the purpose of preventing, detecting, countering, diagnosing, and mitigating cyber attacks.
EFT. Electronic Funds Transfer. The electronic process that transfers money from one bank account to another using computer-based systems and without assistance from a bank staff.
EPROM. Erasable Programmable Read-Only Memory. A type of computer memory that retains data even when the power supply is cut off. More specifically, EPROM is a programmable, non-volatile, read-only memory chip that will retain data, unless said data is erased using ultraviolet light.
EEPROM. Electrically Erasable Programmable Read-Only Memory. A variant of EPROM whose data can be erased using an electrical field. EEPROMs are widely used in flashdrives, digital clocks, and sensors.
EPT. External Penetration Testing. A systematic process by which a computer network or IT infrastructure is tested externally for security weaknesses, vulnerabilities, and other issues that might be exploited by malicious entities. The process — which involves simulated attacks from outside an organisation’s firewall — includes the submission of a comprehensive report containing lists of issues, risks, and remediation advice for vulnerabilities.
ERM. Enterprise Risk Management. The set of practices and methodologies used by organisations to identify, assess, and mitigate business risks and potential hazards that might disrupt a company’s operations or hinder the attainment of its objectives.
ERP. Enterprise Resource Planning. The holistic and systematic management of key business processes (such as procurement, HR operations, compliance, and accounting), as supported by technology, best practices, and software to improve business performance and efficiencies.
ESP. Encapsulating Security Payload. A protocol included in the set of standards that make up the Internet Protocol Security (IPSec) network protocol suite. ESP provides authentication and protection services for data or packet payload being exchanged in an IP network, helping ensure the integrity and confidentiality of such data.
ETA. Evil Twin Attack. A cyber attack that involves a fraudulent Wi-Fi access point masquerading as a legitimate, trusted, or familiar network (aka the “evil twin”). To instigate an attack, the malicious entity behind the bogus access point snoops on connected devices and users, aiming to steal sensitive information (such as passwords and other account access credentials) whenever the opportunity arises. ETAs are commonly orchestrated in public settings where people normally seek free Wi-Fi services such as shopping malls, cafes, airports, and train terminals.
AWARDS
Our Address
Telephone
1300 667 871 or +61 7 3220 0352
Brisbane Office
Level 5, 488 Queen Street, Brisbane, QLD 4000
Sydney Office
Level 21, 133 Castlereigh Street, Sydney, NSW 2000
Melbourne Office
Level 28, 303 Collins Street, Melbourne, VIC 3000