Glossary
Term Description
Encipher
Convert plain text to cipher text by means of a cryptographic system. The process of converting plaintext into unintelligible form by means of a cipher system.
Encrypt
Generic term encompassing encipher and encode. The process used to convert a message into cipher text.
Encryption
The art and science of hiding the meaning or intent of a communication from recipients not meant to receive it. The use of algorithms to encode data in order to render a message or other file readable only for the intended recipient.
Encryption algorithm
A set of mathematically expressed rules for encoding information, thereby rendering it unintelligible to those who do not have the algorithm decoding key. Set of mathematically expressed rules for rendering data unintelligible by executing a series of conversions controlled by a key.
End-to-end encryption
Encryption of information at its origin and decryption at its intended destination without intermediate decryption. The encryption of information at the point of origin within the communications network and postponing of decryption to the final destination point.
Enrollment
The initial process of collecting biometric data from a user and then storing it in a template for later comparison. The process of establishing a new user identity or authentication factor on a system. Secure enrollment requires physical proof of a person’s identity or authentication factor. Generally, if the enrollment process takes longer than two minutes, the identification or authorization mechanism (typically a biometric device) is not approved.
Entity
A subject or an object. Either a subject (an active element that operates on information or the system state) or an object (a passive element that contains or receives information).
Entrapment
Deliberate planting of apparent flaws in an information system for the purpose of detecting attempted penetrations. The deliberate planting of apparent flows in a system to invite penetrations.
Espionage
The malicious act of gathering proprietary, secret, private, sensitive, or confidential information about an organization for the express purpose of disclosing and often selling that data to a competitor or other interested organization (such as a foreign government). The practice or employment of spies; the practice of watching the words and conduct of others, to make discoveries, as spies or secret emissaries; secret watching. This category of computer crime includes international spies and their contractors who steal secrets from defense, academic, and laboratory research facility computer systems. It includes criminals who steal information and intelligence from law enforcement computers, and industrial espionage agents who operate for competitive companies or for foreign governments who are willing to pay for the information. What has generally been known as industrial espionage is now being called competitive intelligence. A lot of information can be gained through “open source” collection and analysis without ever having to break into a competitor’s computer. This information gathering is also competitive intelligence, although it is not as ethically questionable as other techniques.
Ethernet
A common shared media LAN technology. A LAN technology that is in wide use today utilizing CSMA/CD (Carrier Sense Multiple Access/Collision Detection) to control access to the physical medium (usually a category 5 Ethernet cable). Normal throughput speeds for Ethernet are 10 Mbps, 100 Mbps, and 1 Gbps.