Day 11 COPY Flashcards
A nongovernmental security standard that regulates the implementation and security of web payment gateways.
PCI DSS
Payment Card Industry Data Security Standard
This is a multiple output device that regulates the power supply and its quality to multiple devices within a rack of devices in a data center.
PDU
Power Distribution Unit
This is a format for code run by Windows systems and 32 or 64 bit mode.
PE
Portable Executable
An EAP form that sends MSCHAP credentials secured within a TLS envelope.
PEAP
Protected Extensible Authentication Protocol
Small electronics, such as beepers, calendars and note applications used prior to smartphones.
PED
Portable Electronic Device
This is one of the oldest formats of certificates and uses Base64.
PEM
Privacy-enhanced Electronic Mail
This is the property of Key management where in the loss of one key is not in danger data encrypted with earlier session keys.
PFS
Perfect Forward Secrecy
A binary format for storing or sending server certificates and private keys.
PFX
Personal Exchange Format
A widely used cryptosystem initially used for securing email by encryption and digital signatures.
PGP
Pretty Good Privacy
Typically sensitive information regarding the health of an individual.
PHI
Personal Health Information
Bogus messaging sent to a wide array of potential targets.
Phishing
Malicious Spam
This is data or pieces of data that uniquely correspond to or identify one individual and requires special handling.
PII
Personally Identifiable Information
Knowledge-based authentication using a single value or number.
PIN
Personal Identification Number
An identification card that contains a photograph, RFID, barcode, and cryptographically stored PKI information.
PIV
Personal Identity Verification
Gaining control of one application or host in order to manipulate a secondary target.
Pivot
Staging New Attack
Public-key encryption standards developed by RSA Security.
PKCS
Public Key Cryptography Standards
The processes and management associated with the identification and validation of certificates and public keys.
PKI
Public Key Infrastructure
An implementation of an idea or theory that establishes its validity commonly associated with vulnerabilities and exploits.
PoC
Proof of Concept
An attack technique that could subvert confidentiality in an SSL connection.
POODLE
Padding Oracle on Downgrade Legacy Encryption
This protocol listens on TCP/110 and downloads messages from the server.
POP
Post Office Protocol
Performing address and host discovery, along with identifying listening applications.
Port Scan
Network mapping and Service Enumeration
The old form of telephony that implemented dedicated copper connections vs. packet advised voice transmission.
POTS
Plain Old Telephone Service
This is a layer 2 technology implemented to facilitate communication between endpoints or routers.
PPP
Point-to-Point Protocol
A largely deprecated protocol used for establishing tunnels and securing packet ice communication.
PPTP
Point-to-Point Tunneling Protocol
Managing key establishment and management by using pre-established relationships and non-automatic exchange methods.
PSK
Pre-shared Key
Defined by policy, this is software that provides functionality in violation of authorized use.
PUP
Potentially Unwanted Program