-
-
- pen test
- Penetration testing (also called pen testing) is a tool for t...
- pen test (penetration testing)
- Penetration testi...
- penetration testing
- Penetration testing (also called pen te...
- perimeter
- A network perimeter is the boundary between the private and...
- personal firewall
- A personal firewall (sometimes called a des...
- personal firewall (desktop firewall)
- A per...
- personal health record
- A personal health record (PHR) is...
- personal health record (PHR)
- A personal health rec...
- PGP
- Pretty Good Privacy (PGP) is a popular program used to encrypt and decr...
- pharming
- Pharming is a scamming practice in which malicious code is in...
- Phishing season (quiz)
- Ah, the festive season! Carolers ...
- phishing via SMS
- SMiShing is a mobile phone security attack in...
- phlashing
- Phlashing is a permanent denial of service (PDoS) attack th...
- PHR
- A personal health record (PHR) is a collection of health-related inform...
- phreak
- A phreak is someone who breaks into the telephone network illegal...
- phreaking
- A phreak is someone who breaks into the telephone network i...
- piggybacking
- Piggybacking, in a wireless communications context, i...
- ping of death
- On the Internet, ping of death is a denial of servi...
- ping sweep
- A ping sweep (also known as an ICMP sweep) is a basic net...
- ping sweep (ICMP sweep)
- A ping sweep (also known as an ...
- piracy
- Software piracy is the illegal copying, distribution, or use of s...
- pirate
- Software piracy is the illegal copying, distribution, or use of s...
- pirating
- Software piracy is the illegal copying, distribution, or use ...
- PKCS
- The Public-Key Cryptography Standards (PKCS) are a set of intervendor...
- PKI
- A PKI (public key infrastructure) enables users of a basically unsecure...
- PKI (public key infrastructure)
- A PKI (public k...
- plaintext
- In cryptography, plaintext is ordinary readable text before...
- Point to Point Tunneling Protocol
- Point-to-Po...
- Point-to-Point Tunneling Protocol
- Point-to-Po...
- Point-to-Point Tunneling Protocol (PPTP)
- policy server
- A policy server is a security component of a policy...
- policy-based management
- Policy-based management is an a...
- POLP
- The principle of least privilege (POLP) is the practice of limiting a...
- polymorphic malware
- Polymorphic malware is harmful, destruc...
- polynomial versus nondeterministic polynomial
- Port Address Translation
- Port Address Translation (PAT...
- Port Address Translation (PAT)
- Port Address Tran...
- port forwarding
- Tunneling is the transmission of data intended ...
- port mirroring
- Port mirroring, also known as a roving analysis p...
- port mirroring (roving analysis port)
- Por...
- port scan
- A port scan is a series of messages sent by someone attempt...
- potentially unwanted program
- A PUP (potentially un...
- PPTP
- Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of commun...
- presence awareness
- Presence technology is a type of applicat...
- presence technology
- Presence technology is a type of applic...
- Pretty Good Privacy
- Pretty Good Privacy (PGP) is a popular ...
- Pretty Good Privacy (PGP)
- Pretty Good Privacy (PGP) i...
- principle of least privilege
- The principle of leas...
- principle of least privilege (POLP)
- The pri...
- privacy
- On the Internet, privacy, a major concern of users, can be divi...
- private cloud
- Private cloud (also called internal cloud) is a mar...
- private cloud (internal cloud or corporate cloud)
- private key
- In cryptography, a private or secret key is an encrypti...
- private key (secret key)
- In cryptography, a private or...
- privilege
- In the administration of a multi-user computer system, a pr...
- privilege bracketing
- Privilege bracketing is the practice ...
- privilege escalation attack
- A privilege escalation ...
- privileges
- In the administration of a multi-user computer system, a ...
- profile
- In a Windows environment, a user profile is a record of user-sp...
- promiscuous mode
- In a network, promiscuous mode allows a netwo...
- Protected Extensible Authentication Protocol
- protocol analyzer
- A network analyzer is a combination of hard...
- proxy hacking
- Proxy hacking, also known as proxy hijacking, is an...
- pseudonymous profile
- A pseudonymous profile is a collectio...
- public key
- In cryptography, a public key is a value provided by some...
- public key certificate
- A public key certificate is a dig...
- public key cryptography
- Asymmetric cryptography is cryp...
- Public Key Cryptography Standards
- The Public-...
- public key infrastructure
- A PKI (public key infrastru...
- public-key cryptography
- Asymmetric cryptography is cryp...
- Public-Key Cryptography Standards
- The Public-...
- Public-Key Cryptography Standards (PKCS)
- pulsing zombie
- A pulsing zombie is a computer whose security has...
- PUP
- A PUP (potentially unwanted program) is a program that may be unwanted,...
- PUP (potentially unwanted program)
- A PUP (po...
- Quiz: Authentication Methods
- There are quite a few...
- Quiz: Cryptography
- OK, boys and girls! Do you have your secr...
- Quiz: Securing Your Network
- Test yourself. A WhatIs...
- RACF
- RACF (Resource Access Control Facility) is the IBM security managemen...
- RADIUS
- Remote Authentication Dial-In User Service (RADIUS) is a client/s...
- RADIUS (Remote Authentication Dial-In User Serv...
- RAT
- A remote access Trojan (RAT) is a malware program that gives an intrude...
- RAT (remote access Trojan)
- A remote access Trojan (R...
- RavMonE virus
- The RavMonE virus, also known as W32/Rjump, is a vi...
- RavMonE virus (W32/Rjump)
- The RavMonE virus, also kno...
- RDC
- Remote deposit capture (RDC) is a system that allows a customer to scan...
- rDNS
- Reverse DNS (rDNS) is a method of resolving an IP address into a doma...
- red team
- An ethical hacker is a computer and network expert who attack...
- red teaming
- An ethical hacker is a computer and network expert who ...
- redact
- To redact is to edit, or prepare for publishing.
- redacted
- To redact is to edit, or prepare for publishing.
- redacting
- To redact is to edit, or prepare for publishing.
- redaction
- To redact is to edit, or prepare for publishing.
- Register of Known Spam Operations
- The Registe...
- Register of Known Spam Operations (ROKSO)
- Regulation of Investigatory Powers Act
- Regulation of Investigatory Powers Act (RIPA)
- relative ID
- In Windows 2000, the relative identifier (RID) is the p...
- relative identifier
- In Windows 2000, the relative identifie...
- relative identifier (RID)
- In Windows 2000, the relati...