-
-
- pass phrase
- A passphrase is a string of characters longer than the ...
- passive FTP
- Passive FTP (sometimes referred to as PASV FTP because ...
- passphrase
- A passphrase is a string of characters longer than the us...
- password
- A password is an unspaced sequence of characters used to dete...
- password chaos
- Identity chaos (sometimes called password chaos) ...
- password cracker
- A password cracker is an application program ...
- password cracking
- A password cracker is an application progra...
- password hardening
- Password hardening is any one of a variet...
- password synchronization
- Password synchronization is a...
- Passwords: Do you speak geek?
- Test yourself. A Wh...
- PASV FTP
- Passive FTP (sometimes referred to as PASV FTP because it inv...
- Payment Application Data Security Standard
- Payment Card Industry Data Security Standard
- PCI DSS
- The Payment Card Industry Data Security Standard (PCI DSS) is a...
- PCI DSS (Payment Card Industry Data Security St...
- PCI policy
- A PCI policy is a type of security policy that covers how...
- PCI Security Standards Council
- The PCI Security ...
- PCI-CISP
- CISP (Cardholder Information Security Program) and PCI (Payme...
- PE_KRIZ
- Discovered in the fall of 1999, the Kriz virus (known more form...
- PEAP
- PEAP (Protected Extensible Authentication Protocol) is a version of E...
- PEAP (Protected Extensible Authentication Proto...
- PECR
- The Privacy and Electronic Communications Regulations (PECR) are the ...
- pen test
- Penetration testing (also called pen testing) is a tool for t...
- pen test (penetration testing)
- Penetration testi...
- penetration testing
- Penetration testing (also called pen te...
- performance testing
- Performance testing is the process of d...
- perimeter
- A network perimeter is the boundary between the private and...
- Personal Data Privacy
- Consumer privacy, also known as cus...
- personal firewall
- A personal firewall (sometimes called a des...
- personal firewall (desktop firewall)
- A per...
- personal health record
- A personal health record (PHR) is...
- personal health record (PHR)
- A personal health rec...
- personal identity verification (PIV) card
- personal identity verification card
- A perso...
- personally identifiable financial information
- personally identifiable financial information (...
- PGP
- Pretty Good Privacy (PGP) is a popular program used to encrypt and decr...
- pharming
- Pharming is a scamming practice in which malicious code is in...
- phish
- Phishing is an e-mail fraud method in which the perpetrator sends o...
- phisher
- Phishing is an e-mail fraud method in which the perpetrator sen...
- phishing
- Phishing is an e-mail fraud method in which the perpetrator s...
- Phishing season (quiz)
- Ah, the festive season! Carolers ...
- phlashing
- Phlashing is a permanent denial of service (PDoS) attack th...
- PHR
- A personal health record (PHR) is a collection of health-related inform...
- phreak
- A phreak is someone who breaks into the telephone network illegal...
- phreaking
- A phreak is someone who breaks into the telephone network i...
- physical security
- Physical security is the protection of pers...
- PIFI
- Personally identifiable financial information (PIFI) is any type of p...
- ping of death
- On the Internet, ping of death is a denial of servi...
- ping sweep
- A ping sweep (also known as an ICMP sweep) is a basic net...
- ping sweep (ICMP sweep)
- A ping sweep (also known as an ...
- piracy
- Software piracy is the illegal copying, distribution, or use of s...
- pirate
- Software piracy is the illegal copying, distribution, or use of s...
- pirating
- Software piracy is the illegal copying, distribution, or use ...
- PIV card
- A personal identity verification (PIV) card is a United State...
- PKCS
- The Public-Key Cryptography Standards (PKCS) are a set of intervendor...
- PKI
- A PKI (public key infrastructure) enables users of a basically unsecure...
- PKI (public key infrastructure)
- A PKI (public k...
- plaintext
- In cryptography, plaintext is ordinary readable text before...
- Podcast: What is a cognitive biometric?
- Point to Point Tunneling Protocol
- Point-to-Po...
- Point-to-Point Tunneling Protocol
- Point-to-Po...
- Point-to-Point Tunneling Protocol (PPTP)
- policy server
- A policy server is a security component of a policy...
- policy-based management
- Policy-based management is an a...
- POLP
- The principle of least privilege (POLP) is the practice of limiting a...
- polymorphic malware
- Polymorphic malware is harmful, destruc...
- polynomial versus nondeterministic polynomial
- port forwarding
- Tunneling is the transmission of data intended ...
- port mirroring
- Port mirroring, also known as a roving analysis p...
- port mirroring (roving analysis port)
- Por...
- port scan
- A port scan is a series of messages sent by someone attempt...
- potentially unwanted program
- A PUP (potentially un...
- PPTP
- Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of commun...
- presence awareness
- Presence technology is a type of applicat...
- presence technology
- Presence technology is a type of applic...
- pretexting
- Pretexting is a form of social engineering in which one i...
- Pretty Good Privacy
- Pretty Good Privacy (PGP) is a popular ...
- Pretty Good Privacy (PGP)
- Pretty Good Privacy (PGP) i...
- primary account number
- PAN (primary account number) trun...
- primary account number truncation
- PAN (primar...
- principle of least privilege
- The principle of leas...
- principle of least privilege (POLP)
- The pri...
- privacy
- On the Internet, privacy, a major concern of users, can be divi...
- Privacy and Electronic Communications Regulations
- Privacy and Electronic Communications Regulatio...
- private cloud
- Private cloud (also called internal cloud) is a mar...
- private cloud (internal cloud or corporate cloud)
- private key
- In cryptography, a private or secret key is an encrypti...
- private key (secret key)
- In cryptography, a private or...
- privilege
- In the administration of a multi-user computer system, a pr...
- privilege bracketing
- Privilege bracketing is the practice ...
- privileges
- In the administration of a multi-user computer system, a ...
- profile
- In a Windows environment, a user profile is a record of user-sp...
- promiscuous mode
- In a network, promiscuous mode allows a netwo...
- Protected Extensible Authentication Protocol
- proxy hacking
- Proxy hacking, also known as proxy hijacking, is an...
- pseudonymous profile
- A pseudonymous profile is a collectio...