Letter: E

education and training
Definition: In the NICE Framework, cybersecurity work where a person: Conducts training of personnel within pertinent subject domain; develop, plan, coordinate, deliver, and/or evaluate training courses, methods, and techniques as appropriate.

electronic signature
Definition: Any mark in electronic form associated with an electronic document, applied with the intent to sign the document.
Related Term(s): digital signature

encipher
Definition: To convert plaintext to ciphertext by means of a cryptographic system.
Synonym(s): encode, encrypt

encode
Definition: To convert plaintext to ciphertext by means of a code.
Synonym(s): encipher, encrypt

encrypt
Definition: The generic term encompassing encipher and encode.
Synonym(s): encipher, encode

encryption
Definition: The process of transforming plaintext into ciphertext.
Extended Definition: Converting data into a form that cannot be easily understood by unauthorized people.
Synonym(s): encode, encrypt, encipher

enterprise risk management
Definition: A comprehensive approach to risk management that engages people, processes, and systems across an organization to improve the quality of decision making for managing risks that may hinder an organization’s ability to achieve its objectives.
Extended Definition: Involves identifying mission dependencies on enterprise capabilities, identifying and prioritizing risks due to defined threats, implementing countermeasures to provide both a static risk posture and an effective dynamic response to active threats; and assessing enterprise performance against threats and adjusts countermeasures as necessary.
Related Term(s): risk management, integrated risk management, risk

event
Definition: An observable occurrence in an information system or network.
Extended Definition: Sometimes provides an indication that an incident is occurring or at least raise the suspicion that an incident may be occurring.
Related Term(s): incident

exfiltration
Definition: The unauthorized transfer of information from an information system.
Related Term(s): data breach
F
exploit
Definition: A technique to breach the security of a network or information system in violation of security policy.

exposure
Definition: The condition of being unprotected, thereby allowing access to information or access to capabilities that an attacker can use to enter a system or network.

exploitation analysis
Definition: In the NICE Framework, cybersecurity work where a person: Analyzes collected information to identify vulnerabilities and potential for exploitation.