P-GLOSSARY Flashcards
Packet
Data unit that is routed from source to destination in a packet-switched network. A packet contains both routing information and data.
Transmission Control Protocol/Internet Protocol (TCP/IP) is such a packet-switched network.
Packet filtering
Controlling access to a network by analyzing the attributes of the incoming and outgoing packets, and either letting them pass or denying them based on a list of rules
Packet sniffer
Software that observes and records network traffic
Packet switched network
Individual packets follow their own paths through the network from one endpoint to another and reassemble at the destination.
Partitions
Major divisions of the total physical hard disk space
Passive response
A response option in intrusion detection in which the system simply reports and records the problem detected, relying on the user to take subsequent action
Password cracker
A tool that tests the strength of user passwords searching for passwords that are easy to guess. It repeatedly tries words from specially crafted
dictionaries and often also generates thousands (and in some cases, even millions) of permutations of characters, numbers and symbols.
Penetration testing
A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers
Personally Identifiable Information (PII)
Information that can be used alone or with other sources to uniquely identify, contact or locate a single individual
Pharming
This is a more sophisticated form of a man-in-the-middle (MITM) attack.
A user’s session is redirected to a masquerading web site. This can be achieved by corrupting a domain name system (DNS) server on the
Internet and pointing a URL to the masquerading web site’s IP address.
Phishing
This is a type of electronic mail (email) attack that attempts to convince a user that the originator is genuine, but with the intention of obtaining
information for use in social engineering. Phishing attacks may take the form of masquerading as a lottery organization advising the recipient or the user’s bank of a large win; in either case, the intent is to obtain account and personal identification number (PIN) details. Alternative attacks may seek to obtain apparently innocuous business information, which may be used in another form of active attack.
Platform as a Service (PaaS)
Offers the capability to deploy onto the cloud infrastructure custome rcreated or -acquired applications that are created using programming
languages and tools supported by the provider
Policy
Overall intention and direction as formally expressed by management
Port
A hardware interface between a CPU and a peripheral device. Can also refer to a software (virtual) convention that allows remote services to connect to a host operating system in a structured manner.
Privacy
Freedom from unauthorized intrusion or disclosure of information of an individual.