Cybersecurity Terminology

ResourcesTerms & Definitions

eCrime
- criminal activity that involves the use of computers or networks such as the internet
education and training
- In the NICE Framework, cybersecurity work where a person: Conducts training of personnel within pertinent subject domain; develop, plan, coordinate, deliver, and/or evaluate training courses, methods, and techniques as appropriate.
electronic signature
- Any mark in electronic form associated with an electronic document, applied with the intent to sign the document.
encipher
- To convert plaintext to ciphertext by means of a cryptographic system.
encode
- To convert plaintext to ciphertext by means of a code.
encrypt
- The generic term encompassing encipher and encode.
encryption
- The process of transforming plaintext into ciphertext.
enterprise risk management
- A comprehensive approach to risk management that engages people, processes, and systems across an organization to improve the quality of decision making for managing risks that may hinder an organization’s ability to achieve its objectives.
event
- An observable occurrence in an information system or network.
exfiltration
- The unauthorized transfer of information from an information system.
exploit
- A technique to breach the security of a network or information system in violation of security policy.
exploitation analysis
- In the NICE Framework, cybersecurity work where a person: Analyzes collected information to identify vulnerabilities and potential for exploitation.
exposure
- The condition of being unprotected, thereby allowing access to information or access to capabilities that an attacker can use to enter a system or network.
microsoft-logo
ibm-logo
dell-logo
hp-logo
sentinel-logo
vmware-logo
Skip to content