JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
E
E Model
EAM
EAP
Earth Ground
Earthquake
Easter Egg
Easter Egging
Eavesdropping
EBCDIC
ECC (Elliptic Curve Cryptosystem)
ECCM
Echelon
Echo
Echo reply
ECM
E-commerce
Economic Assessment
Economic Intelligence
ECPL
EDAC
EDESPL
Edgar
EDM
Education, Training And Awareness
EEFI
EEI
EEPROM
EFD
Efficiency
EFS (Encrypting File System)
EFT
EFTO
EGADS
Egress filtering
EIA Interface
EIF
Eight-Hundred Service
Eighty-Column Mind
EKMS
El Camino Bignum
Elder Days
Electrochemical Recording
Electrographic Recording
Electromagnetic Countermeasures
Electromagnetic Emanations
Electromagnetic Interference
Electronic Communications Privacy Act of 1986 (ECPA)
Electronic Data Interchange
Electronic Emission Security
Electronic Funds Transfer
Electronic Intelligence
Electronic Key Management System
Electronic Mail
Electronic Message System
Electronic Monitoring
Electronic Records Management
Electronic Seals
Electronic Security
Electronic Security Assessment
Electronic Signature
Electronic Sources Of Security Information
Electronic Surveillance
Electronic Switching System
Electronically
Electronically Generated Key
Electronic-Mail Privacy
Electronic-Mail Security
Electronics Intelligence
Electronics Security
Electro-Optical Intelligence
ELECTRO-OPTINT
Electrosensitive Recording
Electrostatic Recording
Electrothermal Recording
Elegant
Element
Elephantine
Elevating privileges
Elevator Controller
ELINT
Elite
ELIZA Effect
Elliptic Curve Cryptosystem (ECC)
ELSEC
Elvish
EMACS
Email
E-Mail
Emanation
Emanation Security
Emanations
Emanations Security
Embedded Computer
Embedded Computers
Embedded Cryptographic
Embedded Cryptographic System
Embedded Cryptography
Embedded System
Emergency
Emergency Destruction
Emergency Destruction Procedures
Emergency Plan
Emission Security
Emissions Security
Emoticon
Empire
Employee workplace monitoring
EMS
EMSEC
Emulate
Emulator
En-Bloc Signaling
Encapsulating Security Payload (ESP)
Encapsulation
Encipher
Encipherment
Encode
Encoder
Encoding
Encoding Law
Encrypt
Encrypting File System (EFS)
Encryption
Encryption Algorithm
Encryption Codes
Encryption Control Protocol
Encryption key
Encryption method
End System
End User
End User Computing Security
End-Item Accounting
End-Of-Message Function
End-Of-Selection Character
End-Of-Text Character
End-Of-Transmission Character
End-Of-Transmission-Block Character
Endorsed DES
Endorsed DES Equipment
Endorsed For Unclassified
Endorsed For Unclassified Cryptographic Item
Endorsed Tools List
Endorsement
End-To-End
End-To-End Encipherment
End-To-End Encryption
End-To-End Security
Engine
Engineering Development Model
English
Enhanced Generic Routing Encapsulation (GRE)
Enhanced Hierarchical Development Methodology
Enhancement
ENQ
Enrollment
Entangled bits
Entrapment
Entry
Environment
Environmental Controls
Environmental/Natural Threats
EOF
EOL
EOT
EOU
Ephemeral port numbers
EPL
Epoch
EPROM
Epsilon
Epsilon Squared
Equipment Radiation Tempest Zone
Equipment Under Test
Era
Eradication
Erase
Erasure
Eric Conspiracy
Eris
Erotics
Error
Error 33
Error advisement
Error Budget
Error Logs
Error Rate Deprecated Term
Error Ratio
Error-Correcting Code
Error-Correcting System
Error-Detecting Code
Error-Detecting System
Error-Detecting-And-Feedback System
ERTZ
ES
Escalation
Escort(s)
ESP (Encapsulating Security Payload)
Espionage
ESS
Essential Elements Of Friendly Information
Essential Elements Of Friendly Information (EERI)
Essential Elements Of Information
Essential Secrecy
Essentially Rating
ETAP
ETB
Ethical hacking
Ethics
ETL
ETPL
ETX
EUCI
Eut Exerciser Equipment
EV
Evaluated Products
Evaluated Products List
Evaluation
Evaluation Techniques (Evaluation)
Evaluator
Event
Event correlation
Event Cost
Event Value
Event Viewer
Event-Reporting Systems
Evidence Acceptability
Evidence Collection And Preservation
Evil
Evil And Rude
Exa
Examining The Entrails
Exception handling
EXCH
Exchange
Exclusion Area
EXE
Exec
Executable files
Execute
Execute Access Mode
Executing Ring
Execution Of The Budget
Executive Order No. 12046 Of March 27, 1978
Executive Order No. 12472 Or April 3, 1984
Executive State
Exemption
Exercise Key
Exhaustive Attack
Exhaustive search
Expected Lifetime
Expenditure
Expert Security/Audit Tools
Expert Systems
Expired Password
Exploit
Exploitable Channel
Exploitation
Exploratory Development
Exploratory Development Model
Export Controls
Exposure
Extensible Authentication Protocol (EAP)
External auditing tools
External DNS server
External Label
External Memory
External Protected Distribution System
External Security Audit
Extortion
Extra Bit
Extra Block
Extraction Resistance
Eyeball Search
Electronic-Mail Security
security in electronic mail systems introduced to ensure the confidentiality and or integrity of electronic mail messages. (Source: Information Security: Dictionary of Concepts, Standards and Terms; Longley, Shain, Caelli; Macmillan, 1992