Sect. E


Eavesdropping
Echo checks
E-commerce
Economic value add [EVA]
Edit control
Editing
Egress
Electronic data interchange [EDI]

 

 

 

Electronic document
Electronic funds transfer [EFT]
Electronic signature
Electronic vaulting
Elliptical curve cryptography

 

 

 

 

 

Embedded audit module [EAM]
Encapsulation (objects)
Encapsulation security payload [ESP]
Encryption
Encryption algorithm
Encryption key
End-user computing
Engagement letter
Enterprise

 

Enterprise architecture [EA]
Enterprise architecture (EA) for IT
Enterprise goal
Enterprise governance
Enterprise risk management [ERM]
Eradication
ERP (enterprise resource planning) system
Error

Escrow agent
Escrow agreement
Ethernet
Event
Event type

 

 

 

 

 

 

 

Evidence
Exception reports
Exclusive-OR [XOR]
Executable code
Expert system
Exploit
Exposure
Extended Binary-coded for Decimal
Interchange Code [EBCDIC]

 



Extended enterprise
eXtensible Access Control Markup
Language [XACML]
eXtensible Markup Language [XML]
External router
External storage
Extranet