Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

E

Picture of Yee Wei Law

Emotet

by Yee Wei Law - Tuesday, 9 May 2023, 2:50 PM
 

First identified in 2014 [ANY14], the Emotet malware evolved from a banking Trojan designed to steal sensitive information (including credentials) to a modular, polymorphic, multi-threat downloader for other, more destructive malware [MGB22].

References

[ANY14] ANY.RUN, Emotet, 2014. Available at https://any.run/malware-trends/emotet.
[MGB22] C. Manaster, G. Glass, and E. Biasiotto, Emotet Analysis: New LNKs in the Infection Chain, The Monitor, Issue 20, May 2022. Available at https://www.kroll.com/en/insights/publications/cyber/monitor/emotet-analysis-new-lnk-in-the-infection-chain.

Picture of Yee Wei Law

Encapsulation Packet Protocol (EPP)

by Yee Wei Law - Sunday, 21 May 2023, 7:43 PM
 

The Encapsulation Packet Protocol (EPP) is used to transfer protocol data units (PDUs) recognised by CCSDS that are not directly transferred by the Space Data Link Protocols over an applicable ground-to-space, space-to-ground, or space-to-space communications link [CCS20b].

References

[CCS20b] CCSDS, Encapsulation Packet Protocol, Recommended Standard CCSDS 133.1-B-3, The Consultative Committee for Space Data Systems, May 2020. Available at https://public.ccsds.org/Pubs/133x1b3e1.pdf.