E
Eavesdropping: Eavesdropping is simply listening to a private conversation that may reveal information that can provide access to a facility or network.
Elevator Pitch: A summary of your experience, skills, and background.
Encapsulation: A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets.
Encryption: Cryptographic transformation of data (called “plaintext”) into a form (called “cipher text”) that conceals the data’s original meaning to prevent it from being known or used.
Endpoint Detection and Response (EDR): An application that monitors endpoint security.
Endpoint: Any device connected to a network.
Eradication: The complete removal of the incident elements from all affected systems
Escalation Policy: A set of actions that outline who should be notified when an
Ethernet: The most widely-installed LAN technology. Specified in a standard, IEEE 802.3, an Ethernet LAN typically uses coaxial cable or special grades of twisted pair wires. Devices are connected to the cable and compete for access using a CSMA/CD protocol.
Event: An event is an observable occurrence in a system or network.
Exception: An error that involves code that cannot be executed even though it is
Exclusive Operator: An operator that does not include the value of comparison.
Exfiltration: The unauthorized transfer of information from an information system.
Exploit: A technique to breach the security of a network or information system in violation of security policy.
Exposure: The condition of being unprotected, thereby allowing access to information or access to capabilities that an attacker can use to enter a system or network.
External Threat: Anything outside the organization that has the potential to harm organizational assets.
« Back to Glossary Index