vocabularyO2P Flashcards
Object
A collection of data and a collection of methods or functions that operate on that data.
Object
An entity that contains or controls data.
OFB
Output Feedback is a DES mode similar to CFB, but an XOR operation is performed with a randomly generated, encrypted 64-bit, plaintext value.
One-way Function
A generic function that is used for producing output values; input values cannot be exposed from those output values.
Online Backup
A backup type that is performed while the Web is being accessed. The database management system manufacturer provides the utility for this type of backup.
OOP
Object-oriented programming is a programming model that views a program as a collection of discrete objects.
OR
A binary math operator used in cryptography in which if neither of the input values are true or one, then the output is false, if either of the input values are one, then the output is true.
OTP
A One-Time Pad is a type of substitution cipher in which a random value is written on a pad and securely given to the intended recipient. The value is then used to encrypt the original message which is then sent separately. The OTP is then used to decrypt the message and is never used again. An OTP is the only known unconditionally secure cipher.
P
The 3DES plaintext.
Packet Filtering Router
The oldest and most common firewall architecture in which a firewall is placed between the trusted and untrusted networks and uses ACLs to filter the packets.
Packet Sniffer
A troubleshooting tool used on a network to examine packets and to isolate problems that could degrade the performance of the network.
Parallel Test
The second step of a DRP test that enables full processing functionality at an alternate site.
Patent
A property right granted by the U.S. government that protects the inventors right to exclusive control of the creation and distribution of an invention. To warrant a patent, the invention must be new, useful, and nonobvious. A patent lasts for 20 years and is non-renewable.
PEM
Privacy Enhanced Mail is a cryptography protocol that is a secure e-mail standard which specifies how to encrypt and exchange e-mail between different clients.
Penetration Testing
A legal hacking process of pretending to be a hacker, scanning and probing the systems to see if it can be accessed. A coordinated set of attacks to judge the vulnerability of a system.
Phreaks
A cracker whose main goal is to compromise telephone company systems in order to obtain free long distance services.
Physical Access Control
Physical implements such as hardware, a fence, or a locked door that stand between an attacker and the information system.