[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
e-business
necessity of network security for
protection during transmission with PC encryption cards
social engineering attacks, use in
EAP (Extensible Authentication Protocol)
eavesdropping (sniffing) on publicly accessible networks
echo messages to IP broadcast addresses
economic constraints, network design
Electronic Communications Privacy Act (EPCA)
encapsulating security payload [See ESP protocol]
encrypt-decrypt-encrypt (EDE) method
ESP (encapsulating security payload) protocol
public/private keys, digital IDs
SEP (Scalable Encryption Processing)
wired equivalent privacy (WEP) keys
encryption algorithms
Advanced Encryption Standard (AES)
identified in IPSec transform sets
identifying for ESP in IKE Phase 2
end stations, wireless [See stations, wireless]
enforcement section, security policies
Enterprise Composite Network Model
environmental monitoring, high-level security areas
environmental requirements for network equipment 2nd
EPCA (Electronic Communications Privacy Act)
errors
ESP (encapsulating security payload) protocol
establishing use of in IPSec policy
identified in IPSec transform sets
Ethernet
to wireless bridge[Ethernet:wireless]
evasion techniques for network IDSs
events and alarms (RMON), monitoring traffic with
Explicit Congestion Notification (ECN)
extended numbered access lists 2nd
Extensible Authentication Protocol (EAP)
external interface of the firewall