Eavesdropping Echo checks E-commerce Economic value add [EVA] Edit control Editing Egress Electronic data interchange [EDI]
Electronic document Electronic funds transfer [EFT] Electronic signature Electronic vaulting Elliptical curve cryptography
Embedded audit module [EAM] Encapsulation (objects) Encapsulation security payload [ESP] Encryption Encryption algorithm Encryption key End-user computing Engagement letter Enterprise
Enterprise architecture [EA] Enterprise architecture (EA) for IT Enterprise goal Enterprise governance Enterprise risk management [ERM] Eradication ERP (enterprise resource planning) system Error
Escrow agent Escrow agreement Ethernet Event Event type
Evidence Exception reports Exclusive-OR [XOR] Executable code Expert system Exploit Exposure Extended Binary-coded for Decimal Interchange Code [EBCDIC]
Extended enterprise eXtensible Access Control Markup Language [XACML] eXtensible Markup Language [XML] External router External storage Extranet