|
Letter: E - education and training
- Definition: In the NICE Framework, cybersecurity work where a person: Conducts training of personnel within pertinent subject domain; develop, plan, coordinate, deliver, and/or evaluate training courses, methods, and techniques as appropriate.
- electronic signature
- Definition: Any mark in electronic form associated with an electronic document, applied with the intent to sign the document.
- Related Term(s): digital signature
- encipher
- Definition: To convert plaintext to ciphertext by means of a cryptographic system.
- Synonym(s): encode, encrypt
- encode
- Definition: To convert plaintext to ciphertext by means of a code.
- Synonym(s): encipher, encrypt
- encrypt
- Definition: The generic term encompassing encipher and encode.
- Synonym(s): encipher, encode
- encryption
- Definition: The process of transforming plaintext into ciphertext.
- Extended Definition: Converting data into a form that cannot be easily understood by unauthorized people.
- Synonym(s): encode, encrypt, encipher
- enterprise risk management
- Definition: A comprehensive approach to risk management that engages people, processes, and systems across an organization to improve the quality of decision making for managing risks that may hinder an organization’s ability to achieve its objectives.
- Extended Definition: Involves identifying mission dependencies on enterprise capabilities, identifying and prioritizing risks due to defined threats, implementing countermeasures to provide both a static risk posture and an effective dynamic response to active threats; and assessing enterprise performance against threats and adjusts countermeasures as necessary.
- Related Term(s): risk management, integrated risk management, risk
- event
- Definition: An observable occurrence in an information system or network.
- Extended Definition: Sometimes provides an indication that an incident is occurring or at least raise the suspicion that an incident may be occurring.
- Related Term(s): incident
- exfiltration
- Definition: The unauthorized transfer of information from an information system.
- Related Term(s): data breach
- F
- exploit
- Definition: A technique to breach the security of a network or information system in violation of security policy.
- exposure
- Definition: The condition of being unprotected, thereby allowing access to information or access to capabilities that an attacker can use to enter a system or network.
- exploitation analysis
- Definition: In the NICE Framework, cybersecurity work where a person: Analyzes collected information to identify vulnerabilities and potential for exploitation.
|
|
|