Terms
Alphabetical index of published term entries. Use the letter rail to jump.
- Escrowed Encryption StandardUpdated Jan 06, 2026
A U.S. Government standard [FP185] that specifies how to use a symmetric encryption algorithm (SKIPJACK) and create a Law Enforcement Access Field (LEAF) for implementing part of a key escrow system that enables decryption of telecommunications when interception is lawfully authorized.
- EstelleUpdated Jan 06, 2026
A language (ISO 9074 1989) for formal specification of computer network protocols.
- European Telecommunication Standards InstituteUpdated Jan 06, 2026
An independent, non profit organization, based in France, that is officially recognized by the European Commission and responsible for standardization of information and communication technologies within Europe.
- evaluated systemUpdated Jan 06, 2026
A system that has been evaluated against security criteria (for example, against the TCSEC or against a profile based on the Common Criteria).
- evaluationUpdated Jan 06, 2026
Assessment of an information system against defined security criteria (for example, against the TCSEC or against a profile based on the Common Criteria). (Compare: certification.)
- evaluation assurance levelUpdated Jan 06, 2026
A predefined package of assurance components that represents a point on the Common Criteria's scale for rating confidence in the security of information technology products and systems.
- eventUpdated Jan 06, 2026
An observable occurrence in an information system or network.
- Event Triggered ExecutionUpdated Jan 06, 2026
Adversaries may establish persistence using system mechanisms that trigger execution based on specific events. Mobile operating systems have means to subscribe to events such as receiving an SMS message, device boot completion, or other device activities.
- Execution GuardrailsUpdated Jan 06, 2026
Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target. Guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversary’s campaign. Values an adversary can provide about a target system or environment to use as guardrails may include environment information such as location.(Citation: SWB Exodus March 2019)
- Execution through APIUpdated Jan 06, 2026
Adversaries may attempt to leverage Application Program Interfaces (APIs) used for communication between control software and the hardware. Specific functionality is often coded into APIs which can be called by software to engage specific functions on a device or other software.
- exfiltrationUpdated Jan 06, 2026
The unauthorized transfer of information from an information system.
- Exfiltration Over Alternative ProtocolUpdated Jan 06, 2026
Adversaries may steal data by exfiltrating it over a different protocol than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
- Exfiltration Over C2 ChannelUpdated Jan 06, 2026
Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.
- Exfiltration Over Unencrypted Non-C2 ProtocolUpdated Jan 06, 2026
Adversaries may steal data by exfiltrating it over an un encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.
- expireUpdated Jan 06, 2026
Cease to be valid (i.e., change from being valid to being invalid) because its assigned lifetime has been exceeded. (See: certificate expiration.)
- exploitUpdated Jan 06, 2026
A technique to breach the security of a network or information system in violation of security policy.
- exploitation analysisUpdated Jan 06, 2026
In the NICE Framework, cybersecurity work where a person: Analyzes collected information to identify vulnerabilities and potential for exploitation.
- Exploitation for Client ExecutionUpdated Jan 06, 2026
Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to insecure coding practices that can lead to unanticipated behavior. Adversaries may take advantage of certain vulnerabilities through targeted exploitation for the purpose of arbitrary code execution. Oftentimes the most valuable exploits to an offensive toolkit are those that can be used to obtain code execution on a remote system because they can be used to gain access to that system. Users will expect to see files related to the applications they commonly used to do work, so they are a useful target for exploit research and development because of their high utility.
- Exploitation for EvasionUpdated Jan 06, 2026
Adversaries may exploit a software vulnerability to take advantage of a programming error in a program, service, or within the operating system software or kernel itself to evade detection. Vulnerabilities may exist in software that can be used to disable or circumvent security features.
- Exploitation for Initial AccessUpdated Jan 06, 2026
Adversaries may exploit software vulnerabilities to gain initial access to a mobile device.
- Exploitation for Privilege EscalationUpdated Jan 06, 2026
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary controlled code. Security constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will likely need to perform privilege escalation to include use of software exploitation to circumvent those restrictions. (Citation: The MITRE Corporation)
- Exploitation of Remote ServicesUpdated Jan 06, 2026
Adversaries may exploit remote services of enterprise servers, workstations, or other resources to gain unauthorized access to internal systems once inside of a network. Adversaries may exploit remote services by taking advantage of a mobile device’s access to an internal enterprise network through local connectivity or through a Virtual Private Network (VPN). Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary controlled code. A common goal for post compromise exploitation of remote services is for lateral movement to enable access to a remote system.
- Exploit Public-Facing ApplicationUpdated Jan 06, 2026
Adversaries may leverage weaknesses to exploit internet facing software for initial access into an industrial network. Internet facing software may be user applications, underlying networking implementations, an assets operating system, weak defenses, etc. Targets of this technique may be intentionally exposed for the purpose of remote management and visibility.
- exposureUpdated Jan 06, 2026
The condition of being unprotected, thereby allowing access to information or access to capabilities that an attacker can use to enter a system or network.
- Extended Security OptionUpdated Jan 06, 2026
See: secondary definition under "IPSO".
- Extensible Authentication ProtocolUpdated Jan 06, 2026
An extension framework for PPP that supports multiple, optional authentication mechanisms, including cleartext passwords, challenge response, and arbitrary dialog sequences. [R3748] (Compare: GSS API, SASL.)
- Extensible Markup LanguageUpdated Jan 06, 2026
A version of Standard Generalized Markup Language (ISO 8879) that separately represents a document's content and its structure. XML was designed by W3C for use on the World Wide Web.
- extensionUpdated Jan 06, 2026
A data item or a mechanism that is defined in a protocol to extend the protocol's basic or original functionality.
- external controlsUpdated Jan 06, 2026
Refers to administrative security, personnel security, and physical security. (Compare: internal controls.)
- External DefacementUpdated Jan 03, 2026
An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users. External Defacement may ultimately cause users to distrust the systems and to question/discredit the system’s integrity. Externally facing websites are a common victim of defacement; often targeted by adversary and hacktivist groups in order to push a political message or spread propaganda.(Citation: FireEye Cyber Threats to Media Industries)(Citation: Kevin Mandia Statement to US Senate Committee on Intelligence)(Citation: Anonymous Hackers Deface Russian Govt Site) External Defacement may be used as a catalyst to trigger events, or as a response to actions taken by an organization or government. Similarly, website defacement may also be used as setup, or a precursor, for future attacks such as Drive by Compromise.(Citation: Trend Micro Deep Dive Into Defacement)
- External Remote ServicesUpdated Jan 06, 2026
Adversaries may leverage external facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as Windows Remote Management and VNC can also be used externally.(Citation: MacOS VNC software for Remote Desktop)
- extraction resistanceUpdated Jan 06, 2026
Ability of cryptographic equipment to resist efforts to extract keying material directly from the equipment (as opposed to gaining knowledge of keying material by cryptanalysis). [C4009]
- extranetUpdated Jan 06, 2026
A computer network that an organization uses for application data traffic between the organization and its business partners. (Compare: intranet.)
- Extra Window Memory InjectionUpdated Jan 03, 2026
Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process based defenses as well as possibly elevate privileges. EWM injection is a method of executing arbitrary code in the address space of a separate live process.
- extrusion detectionUpdated Jan 06, 2026
Monitoring for unauthorized transfers of sensitive information and other communications that originate inside a system's security perimeter and are directed toward the outside; i.e., roughly the opposite of "intrusion detection".