Eavesdropping
Echo checks
E-commerce
Economic value add [EVA]
Edit control
Editing
Egress
Electronic data interchange [EDI]
Electronic document
Electronic funds transfer [EFT]
Electronic signature
Electronic vaulting
Elliptical curve cryptography
Embedded audit module [EAM]
Encapsulation (objects)
Encapsulation security payload [ESP]
Encryption
Encryption algorithm
Encryption key
End-user computing
Engagement letter
Enterprise
Enterprise architecture [EA]
Enterprise architecture (EA) for IT
Enterprise goal
Enterprise governance
Enterprise risk management [ERM]
Eradication
ERP (enterprise resource planning) system
Error
Escrow agent
Escrow agreement
Ethernet
Event
Event type
Evidence
Exception reports
Exclusive-OR [XOR]
Executable code
Expert system
Exploit
Exposure
Extended Binary-coded for Decimal
Interchange Code [EBCDIC]
Extended enterprise
eXtensible Access Control Markup
Language [XACML]
eXtensible Markup Language [XML]
External router
External storage
Extranet