loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  (Next)
  ALL

E

ECDSA (Elliptic Curve Digital Signature Algorithm)

ECDSA is a widely used elliptic curve signature algorithm. Security depends on strong curves and, critically, secure randomness for each signature; nonce reuse in ECDSA can reveal the private key.

Economic Espionage

Economic espionage refers to the theft of trade secrets or other proprietary information for the purpose of providing economic benefit to a rival company or nation. This can involve a variety of activities, including hacking, corporate spying, or other forms of covert information gathering.

Here are some examples of economic espionage:

  1. A company hacks into the computer systems of a rival company in order to steal sensitive business information, such as financial records or trade secrets.

  2. A corporate insider provides proprietary information to a rival company in exchange for financial compensation.

  3. A foreign government engages in cyber espionage to gather information about the economic plans and strategies of a rival nation.

  4. A company hires a private investigator to covertly gather information about a rival company's business practices.

Overall, economic espionage can have significant negative impacts on the victim company, including financial loss, damage to reputation, and loss of competitive advantage. It is often considered a form of industrial espionage, and can be prosecuted as a crime in many countries



EdDSA (Edwards-curve Digital Signature Algorithm)

EdDSA is a modern elliptic curve signature scheme (commonly Ed25519) designed to be fast and safer in implementation, including more deterministic handling of signature randomness compared to ECDSA.

Edge Computing

Edge Computing is a decentralized computing model where data processing occurs close to the data source (such as IoT devices) rather than in a centralized cloud, reducing latency and improving response times for critical processes in ICS and IIoT environments.

Electronic Intelligence (ELINT)

Electronic Intelligence (ELINT) is a subset of SIGINT focused on non-communications signals, such as radar, navigation beacons, weapon system emitters, telemetry, and other electronic emissions. ELINT supports threat identification, capability assessment, and situational awareness.

Electronic Service Provider (ESP)

An organization that provides services over the internet or electronic networks (email, social media, messaging, cloud storage, hosting). Digital investigators often serve legal process on ESPs to obtain subscriber data, logs, and stored content.

Elliptic Curve Cryptography (ECC)

ECC is asymmetric cryptography based on elliptic curves. ECC provides strong security with shorter keys compared to RSA, and is widely used for key exchange (ECDH) and signatures (ECDSA/EdDSA).

Elliptic Curve Diffie-Hellman (ECDH)

ECDH is a Diffie-Hellman key exchange method based on elliptic curve cryptography. ECDH provides strong security with smaller keys and is widely used in modern secure protocols.

Emitter

A device or system that produces an electronic signal, such as radios, radars, satellites, cellular base stations, Wi-Fi devices, and telemetry transmitters. Emitter identification is central to ELINT and broader SIGINT workflows.

Emitter Fingerprint

Distinctive characteristics of a transmitter that can help differentiate it from similar devices (e.g., frequency stability, phase noise, transient behavior). Fingerprinting can support attribution and tracking over time when conditions allow reliable measurement.


Page:  1  2  3  4  (Next)
  ALL