E - Definitions

Search Definitions
  • E

    E-Sign Act (Electronic Signatures in Global and National Commerce Act)

    The E-Sign Act (Electronic Signatures in Global and National Commerce Act) is a U.S. federal law that specifies that, in the United States, the use of an electronic signature (e-signature) is as legally valid as a traditional signature written in ink on paper.

  • Electronic Code Book (ECB)

    Electronic Code Book (ECB) is a simple mode of operation with a block cipher that's mostly used with symmetric key encryption.

  • electronic discovery (e-discovery or ediscovery)

    Electronic discovery -- also called e-discovery or ediscovery -- refers to any process of obtaining and exchanging evidence in a civil or criminal legal case.

  • Elk Cloner

    Elk Cloner is the first personal computer virus or self-replicating program known to have spread in the wild on a large scale.

  • elliptical curve cryptography (ECC)

    Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller and more efficient cryptographic keys.

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting against unauthorized access and email threats.

  • email signature

    An email signature -- or signature block or signature file -- is the short text that appears at the end of an email message to provide more information about the sender.

  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • email spoofing

    Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to seem as if it originated from a trusted source.

  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • Encrypting File System (EFS)

    Encrypting File System (EFS) provides an added layer of protection by encrypting files or folders on various versions of the Microsoft Windows OS.

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted text to produce encrypted text or to decrypt encrypted text.

  • end-to-end encryption (E2EE)

    End-to-end encryption (E2EE) is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system or device to another.

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a system to gather and analyze security threat-related information from computer workstations and other endpoints, with the goal of finding security breaches as they happen and facilitating a quick response to discovered or potential threats.

  • ethical hacker

    An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to mount ransomware attacks.

  • evil twin attack

    An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one, enabling an attacker to gain access to sensitive information without the end user's knowledge.

  • extended detection and response (XDR)

    Extended detection and response (XDR) is a technology-driven cybersecurity process designed to help organizations detect and remediate security threats across their entire IT environment.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close