Archives: Glossary Terms

Dwell time

<!-- wp:list {"ordered":true} --> <ol><!-- wp:list-item --> <li>The amount of time a visitor spends on a website.</li> <!-- /wp:list-item --> <!-- wp:list-item --> <li>The amount of time an attacker spends within the systems under attack,...

Read More

Dynamic analysis 

A method of testing software that does so in real time, while the software is running.

Read More

East-West

Refers to network traffic within an IT environment (distinct from north-south traffic)

Read More

EDR

Endpoint Detection and Response. Tools that detect actual and/or traces of suspicious activity on end points such as servers and PCs.

Read More

Electromagnetic attack

A side-channel attack that exploits the electromagnetic emissions of a system, commonly, the emissions of a cryptographic system.

Read More

Email hijacking

A kind of man-in-the-middle attack in which an attacker gains control of an email account. Often used in business email compromise.

Read More

Encoding

Representation of electronic data in a specific, often standard, format. Also the format in which data is stored: for example a character encoding is a way to map characters to...

Read More

Encryption 

The process of encoding information in a manner designed to prevent unauthorized users from reading it. This encoding transforms the information from its original form (“plaintext”) into a form (“ciphertext”)...

Read More

Endpoint

A device that serves as a terminal or gateway in a network. Desktop computers, smartphones, laptops, tablets, servers, and Internet-of-things devices are examples of endpoints.

Read More

Endpoint security

The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks.

Read More