The glossary
Cybersecurity Glossary
Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Letter for filtering (will be hidden in prod) :
E
End-to-End Encryption
End-to-end encryption describes communications encryption in which data is encrypted when passing through a network with the routing information still visible.
Letter for filtering (will be hidden in prod) :
E
Elliptical Curve Cryptography (ECC)
Elliptical curve cryptography is a technique that uses an elliptical curve equation to create cryptography keys; keys generated by this theory are much smaller, faster, and efficient, as well! This modern technique keeps the decryption key private, while the encryption key is public. Unlike traditional methods of generating cryptography keys such as RSA, elliptical curve technique uses discrete algorithms making it difficult to decipher the keys or challenge the keys.
Letter for filtering (will be hidden in prod) :
E
Encipher
To encipher is to convert plain text to cipher text via a cryptographic system.
Letter for filtering (will be hidden in prod) :
E
External Network
An external network is a network not controlled by the organization.
Letter for filtering (will be hidden in prod) :
E
Evidence
Evidence is documents, records or any such objects or information that helps prove the facts in a case.
Letter for filtering (will be hidden in prod) :
E
Eradication
Eradication is an important function of the incident management process that follows the containment of an incident. Upon identifying and controlling the incident in the containment stage, eradication helps identify and remove the root cause of the incident completely from the system and avoid any chances of recurrences of the incident.
Letter for filtering (will be hidden in prod) :
E
Ecommerce
The process of conducting any kind of business transaction or a commercial transaction electronically with the help of the internet is termed as ecommerce. The internet enables sellers to accept orders and payments online. As the most popular mode of business today, e-commerce is widely used for completing business-to-business; business-to-consumer; consumer-to-consumer; or consumer-to-business transactions.
Letter for filtering (will be hidden in prod) :
E
Enterprise
An enterprise is an organization with a defined mission/goal and a defined boundary, using information systems to execute that mission, and with responsibility for managing its own risks and performance. An enterprise may consist of all or some of the following business aspects: acquisition, program management, financial management (e.g., budgets), human resources, security, and information systems, information and mission management.
Letter for filtering (will be hidden in prod) :
E
Easter Egg
An easter egg is the hidden functionality within an application program, which becomes activated when an undocumented set of commands and keystrokes are entered. Easter eggs are typically used to display the credits for the development team and are intended to be non threatening.
Letter for filtering (will be hidden in prod) :
E
Embedded Cryptographic System
An embedded cryptosystem is a system performing or controlling a function as an integral element of a larger system or subsystem.