encryption – the act of encoding messages so that if intercepted by an unauthorized party, they cannot be read unless the encoding mechanism can be deciphered.
endpoint – a final digital destination where electronic information is processed by users. Computers, smartphones and tablet devices are all examples of endpoints.
endpoint behavior analysis – analyzing unusual patterns on user devices, such as changes to registry entries, unusual traffic patterns or file changes as indications of potential threats or other malware related activity. This can contribute towards indicators of compromise threat intelligence.
endpoint forensics – the ability to capture both static and in-memory evidence to preserve, rebuild and uncover evidence from a known or suspected attack on a user device. See also endpoint.
endpoint protection – a term used to describe the collective set of security software that has become standard for most user operated digital devices. The security software may include anti-malware, a personal firewall, intrusion prevention and other capabilities.
ethical hacker – an alternative name for a penetration tester.
ethical hacking –the process of supportive (white-hat) penetration testing experts assisting in finding security weaknesses and vulnerabilities.
exfiltrate – to move something with a degree of secrecy sufficient not to be noticed. Used to describe moving stolen data through detection systems.
exploit – to take advantage of a security vulnerability. Well known exploits are often given names. Falling victim to a known exploit with a name can be a sign of low security, such as poor patch management.