Ack5 Flashcards
OVAL
Open Vulnerability and Assessment Language
XML Schema for describing system security state & querying vulnerability reports
OWASP
Open Web Application Security Project
keep up to date with specific attack methods and new types of attacks
P12
PKCS#12
type of certificate format used to transfer your private key and certificate from one Windows host computer to another
PKCS
(public key cryptography standards)
Series of standards defining the use of certificate authorities and digital certificates
Promote PKI use
P2P
Peer-to-Peer
A point-to-point topology is one where two nodes have a dedicated connection to one another. In a point-to- multipoint topology, a central node mediates links between remote nodes
PaaS
Platform as a Service
computing method that uses the cloud to provide any platform-type services (aka Hardware + SW)
PAC
Proxy Auto Configuration
A script that allows a client to configure proxy (access) settings without user intervention
i.e. Will the web request go to the destination or a server?
PAM
Privileged Access Management
Pluggable Authentication Modules (linux access)
PAP
Password Authentication Protocol
unsophisticated authentication method, HTTP-cleartext
PBKDF2
Password-based Key Derivation Function 2
Key stretching algorithm
PBX
Private Branch Exchange
interface between the VoIP network and external telephone and cellular networks
PCAP
Packet Capture
file format for tcpdump & tcpreplay
PCI DSS
Payment Card Industry
Data Security Standard
PDU
Power Distribution Unit
PE
Portable Executable
file format for executables
PEAP
Protected Extensible Authentication Protocol
EAP implementation that uses a server-side certificate to create a secure tunnel for user authentication
PED
Portable Electronic Device
PEM
Privacy Enhanced Mail
PFS
Perfect Forward Secrecy
ensures if a key is compromised the compromise will only affect a single session, not let data from other session get recovered