Archives: Glossary Terms

Email hijacking

A kind of man-in-the-middle attack in which an attacker gains control of an email account. Often used in business email compromise.

Read More

Encoding

Representation of electronic data in a specific, often standard, format. Also the format in which data is stored: for example a character encoding is a way to map characters to...

Read More

Encryption 

The process of encoding information in a manner designed to prevent unauthorized users from reading it. This encoding transforms the information from its original form (“plaintext”) into a form (“ciphertext”)...

Read More

Endpoint

A device that serves as a terminal or gateway in a network. Desktop computers, smartphones, laptops, tablets, servers, and Internet-of-things devices are examples of endpoints.

Read More

Endpoint security

The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks.

Read More

Endpoint security management

A policy-based approach to network security in which endpoint devices (personal computers, terminals, smart phones, etc.) must comply with specific criteria before being granted access to network resources.

Read More

Erasure coding

An information assurance technique that enables reconstruction of data corrupted during storage. Erasure coding transforms and divides data into several pieces that can be stored in separate locations, such that...

Read More

Evil maid attack

An attack targeting a device that has been shut down and left unattended. The attacker physically accesses the target device without the owner’s knowledge (as an untrustworthy cleaning crew might...

Read More

Evil twin

A wi-fi access point established by an attacker to give the appearance of legitimate wi-fi access, but that in fact is used for eavesdropping and other illegitimate purposes.

Read More

Executive Order on Improving the Nation’s Cybersecurity

President Biden’s May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government’s digital defense...

Read More