E

« Back to Glossary Index

Eavesdropping: Eavesdropping is simply listening to a private conversation that may reveal information that can provide access to a facility or network.

Elevator Pitch: A summary of your experience, skills, and background.

Encapsulation: A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.

Encryption: Cryptographic transformation of data (called “plaintext”) into a form (called “cipher text”) that conceals the data’s original meaning to prevent it from being known or used.

Endpoint Detection and Response (EDR): An application that monitors endpoint security.

Endpoint: Any device connected to a network.

Eradication: The complete removal of the incident elements from all affected systems

Escalation Policy: A set of actions that outline who should be notified when an

Ethernet: The most widely-installed LAN technology. Specified in a standard, IEEE 802.3, an Ethernet LAN typically uses coaxial cable or special grades of twisted pair wires. Devices are connected to the cable and compete for access using a CSMA/CD protocol.

Event: An event is an observable occurrence in a system or network.

Exception: An error that involves code that cannot be executed even though it is

Exclusive Operator: An operator that does not include the value of comparison.

Exfiltration: The unauthorized transfer of information from an information system.

Exploit: A technique to breach the security of a network or information system in violation of security policy.

Exposure: The condition of being unprotected, thereby allowing access to information or access to capabilities that an attacker can use to enter a system or network.

External Threat: Anything outside the organization that has the potential to harm organizational assets.

« Back to Glossary Index

Shopping Cart0

Cart