Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
e
e- authentication
E3
EA
EAL
EAN
EAP
EAP execution
EAP Integrity Key
EAP layer
EAP method
EAP server
EAP-FAST
EAPOL
EAPOL-KCK
EAPOL-KEK
EAP-TLS
EAP-TTLS
Earned Value Management
Earned Value Management System
EAS
Ease-Of-Use
E-Authentication Assurance Level
Eavesdropper
Eavesdropping
Eavesdropping (WLAN attack)
Eavesdropping Attack
EBGP
eBits
EBTS
e-business
ebXML
EC
EC2N
ECB
ECC
ECDH
ECDHE
ECDS
ECDSA
ECM
ECN
E-Commerce
Ecordable
ECP
ECU
EDC
EDGE
EDI
EDIV
EDR
Education
Education
E-E
EEPROM
EFD
Effective Period
EFI
EFP
EFS
EFT
e-gov
e-government (C.F.D.)
EGP
Egress Filtering
EICAR
EIGRP
EIK
EKMS
Electric Power Research Institute
Electrically Erasable Programmable Read-Only Memory
Electromagnetic Compatibility
Electromagnetic Environmental Effects
Electromagnetic Interference
Electronic Article Surveillance
Electronic Authentication
Electronic Biometric Transmission Specification
Electronic Business (C.F.D.)
Electronic Business Xml
Electronic Code Book
Electronic Codebook
Electronic Credentials
Electronic Data Interchange
Electronic Evidence
Electronic File System
Electronic Fill Device
Electronic Key Entry
Electronic Key Management System
Electronic Mail
Electronic Media
Electronic Messaging Services
electronic PHI
Electronic Product Code
Electronic Product Code Information Services
Electronic Product Codeepc Identifier
Electronic Protected Health Information
Electronic Serial Number
Electronic Signature (C.F.D.)
Electronically Erasable Programmable Read-Only Memory
Electronically Generated Key
Electronically Stored Information
Electronically-Erasable Programmable Read-Only Memory
Element
Element Processes
Elliptic Curve
Elliptic Curve Cryptography
Elliptic Curve Diffie-Hellman
Elliptic Curve Diffie–Hellman
Elliptic Curve Digital Signature Algorithm
Elliptic Curve DSA
Elliptic Curve Group Modulo A Prime
Elliptic Curve over G[2N]
E-Mail
Embedded Computer (C.F.D.)
Embedded IPv4 Unicast
Embedded Universal Integrated Circuit Card
EMC
Emergency Action Plan
Emergency Medical Services
Emergency Medical Technician
Emergency Response Team
EMI
Emission Security
Employee
EMS
EMSEC
EMSK
EMT
Encapsulating Security Payload
Encapsulating Security Payload Header (IPv6 extension header)
Encapsulating Security Payload Protocol
Encapsulating Security Protocol
Encapsulation
Enclave
Enclave Boundary
Encode
Encrypt
Encrypted Diversifier
Encrypted File System
Encrypted Key
Encrypted Network
Encrypting File System
Encryption
Encryption Algorithm
Encryption Certificate
Encryption Control Protocol
Encryption Root
Encyphering
End Cryptographic Unit
End Entity
End User Device
End User License Agreement
End-Item Accounting
Endpoint Protection Platform
End-Point Protection Platform
End-To-End Encryption
End-To-End Security
Energy Management System
Enhanced Data for GSM Evolution
Enhanced Data Rate
Enhanced Interior Gateway Routing Protocol
Enhanced Messaging Service
Enhanced Overlay
Enhancements
Enrollment Data Set
Enrollment Manager
Enterprise
Enterprise Architecture
Enterprise Configuration Manager
Enterprise Cross Domain Services
Enterprise Cross Domain Services Provider
Enterprise Privacy Authorization Language
Enterprise Resource Planning
Enterprise Resource Planning System
Enterprise Risk Management
Enterprise Service
Enterprise Subsystem
Enterprise-Hosted Cross Domain Solutions
Entity
Entity (party)
Entity Authentication
Entropy
Entropy Input
Entropy Source
Environment
Environment Conditions
Environment Of Operation
Environmental Failure Protection
Environmental Failure Testing
Environmental Testing
EPAL
EPC
EPC Identifier
EPCIS
Ephemeral Diffie-Hellman Key Exchange
Ephemeral Elliptic Curve Diffie-Hellman
Ephemeral Key
Ephemeral Key Pair
EPHI
EPHI
EPL
EPP
EPRI
EPROM
EPS
Equivalent Process
Equivalent Security Domain Policies
Equivalent Security Domains
ER
Erasable Programmable Read-Only Memory
Erasure
Erfc
ERP
Error Detection Code
Error-Detection Code
ERT
Escape
ESI
ESN
ESP
ESS
ETSI
EUI-64
eUICC
EULA
European Article Number
European Institute For Computer Antivirus Research
European Telecommunications Standards Institute
eUtility
Evaluate
Evaluated Products List (C.F.D.)
Evaluating Authority
Evaluation Assurance Level (C.F.D.)
Evasion
Event
Event Aggregation
Event Correlation
Event Filtering
Event Reduction
Events Per Second
EVM
EVMS
EVSSL
Examination
Examine
Exclusive OR
Exclusive-OR
Exclusive-Or operation
Exculpatory Evidence
eXecute in Place
Executive Agency
Exercise
Exercise Briefing
Exercise Director
Exfiltration
Expected Output
Explicit Congestion Notification
Exploitable Channel
ext2fs
ext3fs
Extendable-Output
Extended Data Encryption Standard
Extended Master Session Key
Extended Sequence Number
Extended Service Set
Extended Unique Identifier 64 Bit Addresses
Extended Validation Secure Sockets Layer
Extensibility
Extensible Access Control Markup Language
Extensible Authentication Protocol
Extensible Authentication Protocol Flexible Authentication Via Secure Tunneling
Extensible Authentication Protocol Over LAN
Extensible Authentication Protocol Over LAN Key Confirmation Key
Extensible Authentication Protocol Over LAN Key Encryption Key
Extensible Authentication Protocol-Transport Layer Security
Extensible Authentication Protocol-Tunneled Transport Layer Security
Extensible Configuration Checklist Description Format
Extensible Configuration Checklist Description Format 1.1.4
Extensible Firmware Interface
Extensible Markup Language
Extensible Mark-Up Language
Extensible Rights Markup Language
Extensible Stylesheet Language Transformation
Exterior Border Gateway Protocol
Exterior Gateway Protocol
External Information System (or component)
External Information System or Component
External Information System Service
External Information System Service Provider
External Information Systems Service Provider
External Network
External Operational Management Role
External Security Testing
external utility
Extraction-Then-Expansion
Extranet