Skip to main content
A B C D E F G H I J K L M N O P Q R S T U V W X Z

E

EAL

Evaluation Assurance Level

EAP

Extensible Authentication Protocol

EAP-TLS

Extensible Authentication Protocol-Transport Layer Security

Easter egg

Hidden functionality within an application that is activated when an undocumented set of commands and keystrokes are entered. Easter eggs are typically used to display the credits for the development team or a humorous message and are intended to be non-threatening.

Easy Steps Guide

A guide developed by the ACSC to help Australians protect themselves from cyber criminals.

ECDH

Elliptic Curve Diffie-Hellman

ECDSA

Elliptic Curve Digital Signature Algorithm

EEPROM

Electrically erasable programmable read-only memory

EFTPOS

Electronic funds transfer at point of sale

Electronic funds transfer at point of sale (EFTPOS)

An electronic payment system involving electronic funds transfers based on the use of payment cards, such as debit or credit cards, at payment terminals located at the place the sale took place.

Email

Standing for 'electronic mail', a method of exchanging messages between people using electronic devices.

Emanation security (EMSEC)

The counter-measures employed to reduce classified emanations from a facility and its systems to an acceptable level. Emanations can be in the form of radio frequency (RF) energy, sound waves or optical signals.

Emanation Security Program (ESP)

An ACSC program that sets out the requirements for government and organisations to be formally recognised to conduct emanation security practices to national standards.

EMET

Enhanced Mitigation Experience Toolkit

Emotet

A malware strain and a cybercrime operation. The first versions of the Emotet malware functioned as a banking Trojan aimed at stealing banking credentials from infected hosts. Emotet operators then updated the Trojan and reconfigured it to work primarily as a 'loader' (a type of malware that gains access to a system) that allows its operators to download additional payloads.

Encapsulating Security Payload (ESP)

A protocol used for encryption and authentication in Internet Protocol security (IPsec).

Encrypt

To convert information or data into a code, especially to prevent unauthorised access.

Encrypting files

The process of converting files into a code, to prevent unauthorised access.

Encryption

The conversion of electronic plaintext data into unreadable ciphertext using algorithms. Encryption protects the confidentially of data at rest and in transit. Both encryption and decryption are functions of cryptography.

Encryption software

Software designed to ensure the confidentiality of data by encrypting it when at rest.

End of support

When a company ceases support for a product or service. This is typically applied to hardware and software products when a company releases a new version and ends support for certain previous versions.

End user device

A personal computer, personal digital assistant, smart phone or removable storage media (e.g. USB flash drive, memory card, external hard drive, writeable CD or DVD) that can store information.

End-to-end encryption

A method of secure communication where only the communicating users can read data transferred from one end-system or device to the other.

Endpoint security

A methodology of protecting a network when accessed via remote devices such as laptops or other wireless and mobile devices. Each device with a remote connection to the network creates a potential entry point for security threats.

Enterprise mobility

An approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.

EPL

Evaluated Products List

EPROM

Erasable programmable read-only memory

Escort

A person who ensures that when maintenance or repairs are undertaken to ICT equipment, uncleared people are not exposed to information they are not authorised to access.

ESP

Emanation Security Program

ESP

Encapsulating Security Payload

Essential Eight (E8)

The eight essential mitigation strategies that the ACSC recommends organisations implement as a baseline to make it much harder for adversaries to compromise their systems.

Essential services

Those services that are vital to the health and welfare of a population and therefore are essential to maintain even in a disaster.

Evaluated Products List (EPL)

The list of certified information and communications technology (ICT) products for use by Australian and New Zealand government agencies in the protection of government information as required by the Australian Government Information Security Manual (ISM).

Evaluation Assurance Level (EAL)

Evaluation Assurance Level (EAL1 through EAL7)

Event

In the context of system logs, an event constitutes an evident change to the normal behaviour of a network, system or user.

Event forwarding

The transmission of information to a centralised computer concerning events that take place on remote computers or servers. In this context, an event is any occurrence that affects a file, program or task. Events are commonly used for troubleshooting applications and drivers.

Event logging

Used by a security information and event management tool. This tool provides a level of analysis of the contents of an event log to help network administrators determine what is going on within a network.

Executable

A file that causes a computer to perform indicated tasks according to encoded instructions.

Exploit

A piece of code that exploits bugs or vulnerabilities in software or hardware to gain access a system or network.

e

eSafety Commissioner

An independent statutory office supported by the Australian Communications and Media Authority (ACMA). The eSafety Commissioner has various functions and powers to foster online safety for all Australians.

eXtensible Markup Language (XML)

A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.