The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
E
Embedded Cryptography
Embedded cryptography is cryptography engineered into an equipment or system whose basic function is not cryptographic.
Letter for filtering (will be hidden in prod) :
E
Electronic Key Entry
Electronic key entry is the entry of cryptographic keys into a cryptographic module using electronic methods such as a smart card or a key-loading device.
Letter for filtering (will be hidden in prod) :
E
Electronic Key Management System
An electronic key management system is an interoperable collection of systems being developed by services and agencies of the U.S.. government to automate the planning, ordering, generating, distributing, storing, filling, using, and destroying of electronic key and management of other types of ComSec material.
Letter for filtering (will be hidden in prod) :
E
Exploit
An exploit is taking advantage of a weakness or a flaw in the system to intrude, attack it.
Letter for filtering (will be hidden in prod) :
E
Encryption Algorithm
An encryption algorithm is a set of mathematically expressed rules for rendering data unintelligible by executing a series of conversions controlled by a key.
Letter for filtering (will be hidden in prod) :
E
External Security Testing
External security testing is security testing conducted from outside the organization’s security perimeter.
Letter for filtering (will be hidden in prod) :
E
Ethernet
Ethernet is the most popular local area network (LAN) technology that specifies cabling and signaling systems for home networks or for organizations. Ethernet uses bus topology to support data transfers and carrier sense multiple access/ collision detection (CSMA/CD) systems to process requests at the same time.
Letter for filtering (will be hidden in prod) :
E
Exploitable Channel
An exploitable channel is a channel that allows the violation of the security policy governing an information system and is usable or detectable by subjects external to the trusted computing base.
Letter for filtering (will be hidden in prod) :
E
Encryption
Encryption is a process of maintaining data integrity and confidentiality by converting plain data into a secret code with the help of an algorithm. Only authorized users with a key can access encrypted data or cipher text.
Letter for filtering (will be hidden in prod) :
E
End Cryptographic Unit
An end cryptographic unit is a device that (1) performs cryptographic functions, (2) typically is part of a larger system for which the device provides security services, and (3) from the viewpoint of a supporting security infrastructure (e.g., a key management system), is the lowest level of identifiable component with which a management transaction can be conducted.