P Flashcards
password
A sequence of characters used to prove one’s identity. It is used during a logon process and should be highly protected.
payment card industry data security standard (PCI DSS)
An information security standard for organizations that are involved in payment card transactions.
penetration
A successful attempt at circumventing security controls and gaining access to a system.
penetration testing
Penetration testing is a method of evaluating the security of a computer system or network by simulating an attack that a malicious hacker would carry out. This is done so that vulnerabilities and weaknesses can be uncovered.
permissions
The type of authorized interactions that a subject can have with an object. Examples include read, write, execute, add, modify, and delete.
personnel security
The procedures that are established to ensure that all personnel who have access to sensitive information have the required authority as well as appropriate clearances. Procedures confirm a person’s background and provide assurance of necessary trustworthiness.
physical controls
Controls that pertain to controlling individual access into the facility and different departments, locking systems and removing unnecessary floppy or CD-ROM drives, protecting the perimeter of the facility, monitoring for intrusion, and checking environmental controls.
physical security
Controls and procedures put into place to prevent intruders from physically accessing a system or facility. The controls enforce access control and authorized access.
piggyback
Unauthorized access to a system by using another user’s legitimate credentials.
plaintext
In cryptography, the original readable text before it is encrypted.
playback attack
Capturing data and resending the data at a later time in the hope of tricking the receiving system. This is usually carried out to obtain unauthorized access to specific resources.
privacy
A security principle that protects an individual’s information and employs controls to ensure that this information is not disseminated or accessed in an unauthorized manner.
procedure
Detailed step-by-step instructions to achieve a certain task, which are used by users, IT staff, operations staff, security members, and others.
protection ring
An architecture that provides hierarchies of privileged operation modes of a system, which gives certain access rights to processes that are authorized to operate in that mode. Supports the integrity and confidentiality requirements of multitasking operating systems and enables the operating system to protect itself from user programs and rogue processes.
protocol
A set of rules and formats that enables the standardized exchange of information between different systems.