Archives: Glossary Terms

Endpoint security management

A policy-based approach to network security in which endpoint devices (personal computers, terminals, smart phones, etc.) must comply with specific criteria before being granted access to network resources.

Read More

Erasure coding

An information assurance technique that enables reconstruction of data corrupted during storage. Erasure coding transforms and divides data into several pieces that can be stored in separate locations, such that...

Read More

Evil maid attack

An attack targeting a device that has been shut down and left unattended. The attacker physically accesses the target device without the owner’s knowledge (as an untrustworthy cleaning crew might...

Read More

Evil twin

A wi-fi access point established by an attacker to give the appearance of legitimate wi-fi access, but that in fact is used for eavesdropping and other illegitimate purposes.

Read More

Executive Order on Improving the Nation’s Cybersecurity

President Biden’s May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal government’s digital defense...

Read More

Exfiltration

The unauthorized transfer of information from a system.

Read More

Expert system

A system that simulates the decision-making of a human expert by applying factual or heuristic rules generated by a human subject matter expert.

Read More

Exploit

Definition of exploit : noun Definition of exploit : verb

Read More

Exploit Kit

(Verb) To attack a weakness in an IT system to accomplish some malicious action. (Noun) Generally refers to a specific method/procedure/software used to exploit a known vulnerability.

Read More

False flag

An operation designed to deflect attribution to an uninvolved party. A cyber operation would be a false flag if the threat actor behind it took steps to impersonate or use...

Read More