Glossary E
- Exfiltration
- Extranet
- Evaluation Assurance Level
- Enclave Boundary
- Encryption Certificate
- ECC
- E-commerce
- Egress Filtering
- EMI
- Encryption Algorithm
- EPHI
- Encryption
- ECDSA
- Emergency Action Plan
- Emission Security (EMSEC)
- ESPP
- Encipher
- Enclave
- Encode
- Encrypt
- Encryption
- Endpoint Protection Platform
- End-to-End Encryption
- Enterprise
- Ephemeral Key
- Ephemeral Key Pair
- Erasure
- Error Detection Code
- Event
- Event Aggregation
- Event Correlation
- Event Filtering
- Evidence
- Exclusive OR

Exfiltration
The unauthorized transfer of information from an information system.See CNSSI 4009-2015 for more information
Evaluation Assurance Level
Set of assurance requirements that represent a point on the Common Criteria predefined assurance scale. Rationale: NIAP has switched to a “protection profile” program to ...
Enclave Boundary
Point at which an enclave’s internal network service layer connects to an external network’s service layer, i.e., to another enclave or to a wide area ...
Encryption Certificate
A certificate containing a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish or exchange a session key ...
E-commerce
The use of network technology (especially the internet) to buy or sell goods and services. See NIST SP 800-32 for more information.
Egress Filtering
Filtering of outgoing network traffic. See NIST SP 800-41 Rev. 1 for more information.
Encryption Algorithm
Set of mathematically expressed rules for rendering data unintelligible by executing a series of conversions controlled by a key.See CNSSI 4009-2015 for more information.
Encryption
Encryption provides confidentiality and prevents unauthorized disclosure of data. Encrypted data is in a ciphertext format that is unreadable. Attackers can’t read encrypted traffic sent ...
Emergency Action Plan
A plan developed to prevent loss of national intelligence; protect personnel, facilities, and communications; and recover operations damaged by terrorist attack, natural disaster, or similar ...
Emission Security (EMSEC)
The component of communications security that results from all measures taken to deny unauthorized persons information of value that might be derived from intercept and ...
Encryption
Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”) that conceals the data’s original meaning to prevent it from being known or used. ...
Endpoint Protection Platform
Safeguards implemented through software to protect end-user machines such as workstations and laptops against attack (e.g., antivirus, antispyware, antiadware, personal firewalls, host-based intrusion detection and prevention ...
End-to-End Encryption
Communications encryption in which data is encrypted when being passed through a network, but routing information remains visible. See NIST SP 800-12 and NIST SP 800-12 Rev. 1 under End-to-End ...
Enterprise
An organization with a defined mission/goal and a defined boundary, using information systems to execute that mission, and with responsibility for managing its own risks ...
Ephemeral Key
A cryptographic key that is generated for each execution of a key-establishment process and that meets other requirements of the key type (e.g., unique to ...
Ephemeral Key Pair
A key pair, consisting of a public key (i.e., an ephemeral public key) and a private key (i.e., an ephemeral private key) that is intended ...
Error Detection Code
A code computed from data and comprised of redundant bits of information designed to detect, but not correct, unintentional changes in the data. See NIST SP 800-152 under ...
Event Aggregation
The consolidation of similar log entries into a single entry containing a count of the number of occurrences of the event. See NIST SP 800-92 under Aggregation for ...
Event Correlation
Finding relationships between two or more log entries. See NIST SP 800-92 under Correlation for more information.
Event Filtering
The suppression of log entries from analysis, reporting, or long-term storage because their characteristics indicate that they are unlikely to contain information of interest. See NIST SP ...