E commerce
The process of conducting any kind of business transaction or a commercial transaction electronically with the help of the internet is termed as e-commerce. The internet enables sellers to accept orders and payments online. As the most popular mode of business today, e-commerce is widely used for completing business-to-business; business-to-consumer; consumer-to-consumer; or consumer-to business transactions.
E government
E-government is the u.s. government use of web-based internet applications and other information technology
Easter egg
An easter egg is the hidden functionality within an application program, which becomes activated when an undocumented set of commands and keystrokes are entered. Easter eggs are typically used to display the credits for the development team and are intended to be non threatening.
Egress filtering
Egress filtering is the filtering of outgoing network traffic.
Electronic key entry
Electronic key entry is the entry of cryptographic keys into a cryptographic module using electronic methods such as a smart card or a key-loading device.
Electronic key management system
An electronic key management system is an interoperable collection of systems being developed by services and agencies of the u.s. government to automate the planning, ordering, generating, distributing, storing, filling, using, and destroying of electronic key and management of other types of comsec material.
Electronic signature
An electronic signature is the process of applying any mark in electronic form with the intent to sign a data object and is used interchangeably with digital signature.
Electronically generated key
An electronically generated key is a key generated in a comsec device by mechanically or electronically introducing a seed key into the device and then using the seed in conjunction with a software algorithm stored in the device to produce the desired key.
Elliptical curve cryptography ecc
Elliptical curve cryptography is a technique that uses an elliptical curve equation to create cryptography keys; keys generated by this theory are much smaller, faster, and efficient, as well! This modern technique keeps the decryption key private, while the encryption key is public. Unlike traditional methods of generating cryptography keys such as rsa, elliptical curve technique uses discrete algorithms making it difficult to decipher the keys or challenge the keys.
Embedded cryptographic system
An embedded cryptosystem is a system performing or controlling a function as an integral element of a larger system or subsystem.
Embedded cryptography
Embedded cryptography is cryptography engineered into an equipment or system whose basic function is not cryptographic.
Encapsulation security payload
An encapsulation security payload is an ipsec protocol that offers mixed security in the areas of authentication, confidentiality, and integrity for ipv4 and ipv6 network packets. Encapsulation security payload offers data integrity and protection services by encrypting data, anti-replay, and preserving it in its assigned ip.
Encipher
To encipher is to convert plain text to cipher text via a cryptographic system.
Encryption algorithm
An encryption algorithm is a set of mathematically expressed rules for rendering data unintelligible by executing a series of conversions controlled by a key.
Encryption certificate
An encryption certificate is a certificate containing a public key that is used to encrypt electronic messages, files, documents, or data transmissions, or to establish or exchange a session key for these same purposes.
Encryption key
An encryption key is a code of variable value developed with the help of an encryption algorithm to encrypt and decrypt information.
Encryption
Encryption is a process of maintaining data integrity and confidentiality by converting plain data into a secret code with the help of an algorithm. Only authorized users with a key can access encrypted data or cipher text.
End cryptographic unit
An end cryptographic unit is a device that (1) performs cryptographic functions, (2) typically is part of a larger system for which the device provides security services, and (3) from the viewpoint of a supporting security infrastructure (e.g., a key management system), is the lowest level of identifiable component with which a management transaction can be conducted.
End end encryption
End-to-end encryption describes communications encryption in which data is encrypted when passing through a network with the routing information still visible.
Enterprise architecture
The enterprise architecture is the description of an enterprise’s entire set of information systems: configuration, integration and how they interface. Enterprise architecture also describes how they are operated to support the enterprise mission, and how they contribute to the enterprise’s overall security posture.
Enterprise risk management
Enterprise risk management is the methods and processes used by an enterprise to manage risks to its mission and to establish the trust necessary for the enterprise to support shared missions. It involves the identification of mission dependencies on enterprise capabilities, the identification and prioritization of risks due to defined threats, the implementation of countermeasures to provide both a static risk posture and an effective dynamic response to active threats; and it assesses enterprise performance against threats and adjusts countermeasures as necessary.
Enterprise
An enterprise is an organization with a defined mission/goal and a defined boundary, using information systems to execute that mission, and with responsibility for managing its own risks and performance. An enterprise may consist of all or some of the following business aspects: acquisition, program management, financial management (e.g., budgets), human resources, security, and information systems, information and mission management.
Entrapment
Entrapment is the deliberate planting of apparent flaws in an information system with the intent to detect attempted penetrations.
Eradication
Eradication is an important function of the incident management process that follows the containment of an incident. Upon identifying and controlling the incident in the containment stage, eradication helps identify and remove the root cause of the incident completely from the system and avoid any chances of recurrences of the incident.
Ethernet
Ethernet is the most popular local area network (lan) technology that specifies cabling and signalling systems for home networks or for organizations. Ethernet uses bus topology to support data transfers and carrier sense multiple access/ collision detection (csma/cd) systems to process requests at the same time.
Event
An event is an action or an occurrence that a program can detect. Examples of some events are clicking a mouse button or pressing the key, etc.
Evidence
Evidence is documents, records or any such objects or information that helps prove the facts in a case.
Exercise key
An exercise key is cryptographic key material used exclusively to safeguard communications transmitted over-the-air during military or organized civil training exercises.
Exploit code
An exploit code is a program that allows attackers to automatically break into a system.
Exploit
An exploit is taking advantage of a weakness or a flaw in the system to intrude, attack it.
Exploitable channel
An exploitable channel is a channel that allows the violation of the security policy governing an information system and is usable or detectable by subjects external to the trusted computing base.
External network
An external network is a network not controlled by the organization.
External security testing
External security testing is security testing conducted from outside the organization’s security perimeter.