P Flashcards
P12
PKCS #12
This format allows for the storage of both public and
private keys in open or encrypted form.
P2P
Peer to Peer
A headless file sharing system that has no centralized
point of control and facilitates wide-open file sharing.
PaaS
Platform as a Service
A form of access that allows an organization to create
and run its own applications on the cloud.
PAC
Proxy Auto Configuration
A JavaScript based technology that regulates the
configuration of browsers and their use of web proxies.
PAM
Pluggable Authentication Modules
Dynamically, loadable authentication libraries used on
Linux.
PAP
Password Authentication Protocol
This is an insecure authentication protocol, sometimes
used between routers.
PAT
Port Address Translation
Address translation that multiplexes many internal
addresses through one or a few external address, linking
connections based upon the source port.
Patch
management
Configuration and baseline maintenance
An application designed to identify compliance
deviations and variance from a baseline, and then rectify
it.
PBKDF2
Password-based Key Derivation Function 2
This cryptographic function, processes, and otherwise
insecure secret through repeated rounds of hashing to
create a longer key value.
PBX
Private Branch Exchange
The point of interface between the public switched
telephone network and an organization’s internal
telephony.
PCAP
Packet Capture
Sniffing and recording network data into a file for later
analysis.
PCI DSS
Payment Card Industry Data Security Standard
A nongovernmental security standard that regulates the
implementation and security of web payment gateways.
PDU
Power Distribution Unit
This is a multiple output device that regulates the power
supply and its quality to multiple devices within a rack
of devices in a data center.
PE
Portable Executable
This is a format for code run by Windows systems and
32 or 64 bit mode.
PEAP
Protected Extensible Authentication Protocol
An EAP form that sends MSCHAP credentials secured
within a TLS envelope.
PED
Portable Electronic Device
Small electronics, such as beepers, calendars and note
applications used prior to smartphones.
PEM
Privacy-enhanced Electronic Mail
This is one of the oldest formats of certificates and uses
Base64.
PFS
Perfect Forward Secrecy
This is the property of Key management where in the
loss of one key is not in danger data encrypted with
earlier session keys.
PFX
Personal Exchange Format
A binary format for storing or sending server certificates
and private keys.
PGP
Pretty Good Privacy
A widely used cryptosystem initially used for securing
email by encryption and digital signatures.
PHI
Personal Health Information
Typically sensitive information regarding the health of
an individual.
Phishing
Malicious spam
Bogus messaging sent to a wide array of potential
targets.
PII
Personally Identifiable Information
This is data or pieces of data that uniquely correspond to
or identify one individual and requires special handling.
PIN
Personal Identification Number
Knowledge-based authentication using a single value or
number.
PIV
Personal Identity Verification
An identification card that contains a photograph, RFID,
barcode, and cryptographically stored PKI information.
Pivot
Staging new attack
Gaining control of one application or host in order to
manipulate a secondary target.
PKCS
Public Key Cryptography Standards
Public-key encryption standards developed by RSA
Security.
PKI
Public Key Infrastructure
The processes and management associated with the
identification and validation of certificates and public
keys.
PoC
Proof of Concept
An implementation of an idea or theory that establishes
its validity commonly associated with vulnerabilities
and exploits.
POODLE
Padding Oracle on Downgrade Legacy Encryption
An attack technique that could subvert confidentiality in
an SSL connection.
POP
Post Office Protocol
This protocol listens on TCP/110 and downloads
messages from the server.
Port scan
Network mapping and service enumeration
Performing address and host discovery, along with
identifying listening applications.
POTS
Plain Old Telephone Service
The old form of telephony that implemented dedicated
copper connections vs. packet advised voice
transmission.
PPP
Point-to-Point Protocol
This is a layer 2 technology implemented to facilitate
communication between endpoints or routers.
PPTP
Point-to-Point Tunneling Protocol
A largely deprecated protocol used for establishing
tunnels and securing packet ice communication.
PSK
Pre-shared Key
Managing key establishment and management by using
pre-established relationships and non-automatic
exchange methods.
PUP
Potentially Unwanted Program
Defined by policy, this is software that provides
functionality in violation of authorized use.