Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
p
P A
P.L.
P_HASH
P1
P2
P2P
PAA
PaaS
PAC
Packet
Packet Filter
Packet Filter Firewalls
Packet Filtering
Packet Fragmentation And Reassembly
Packet Number
Packet Sniffer
PACS
pad
pad10*1
Padding
Page Check
Pairwise Master Key
Pairwise Master Key Security Association
Pairwise Transient Key
Pairwise Trust
PAL
PAO
PAOS
PAP
Paperwork Reduction Act
Parameter
Parameters
Paravirtualization
Paring Code
Parity (C.F.D.)
Parity Bit (C.F.D.)
Parity Bit
Participant Guide
Partition
Partitioning
Party
Passive Attack
Passive Attack (WLAN attack)
Passive Fingerprinting
Passive Security Testing
Passive Sensor
Passive Tag
Passive Wiretapping
Passphrase
Password
Password Authentication Protocol
Password Cracking
Password Protected
Password Unblocking Key
Password-Based Key Derivation Function
Patch
Patch Management
Path Histories
Path Maximum Transmission Unit
Path Mtu
Path Validation
Path Validation Module
Payload
Payload Length (IPv6 Field)
Payment Card Industry
Payment Card Industry Data Security Standard
PBA
PBAC
PBE
PBKDF
PBX
PC
PC/SC
PCI
PCI DSS
PCIE
PCII
PCL
PCM
PCMCIA
Pcmcia Security Tokens
PCP
PDA
PDF
PDP
PDS
PE
PEAP
PED
Peer
Peer Authorization Database
Peer Entity Authentication
Peer Entity Authentication Service
Peer/Authenticator Layer
Peer-To-Peer
Peer-To-Peer Mode
PEI
PEM
Penetration
Penetration Testing
PEP
Per-Call Key
Perfect Forward Secrecy
Performance Reference Model
Performance-Based
Perimeter (C.F.D.)
Period Of Protection
Periods Processing
Peripheral Component Interconnect
Perishable Data
Permalock
Per-Message Secret Number
Permutation
Persistent Cookie
Person Identifier (A Field In The Fasc-N)
Persona
Personal Accountability
Personal Computer
Personal Computer / Smart Card
Personal Computer Memory Card International Association
Personal Computer/Smart Card
Personal Digital Assistant
Personal Firewall
Personal Firewall Appliance
Personal Identification Number
Personal Identification Verification
Personal Identity Verification
Personal Identity Verification Authorization
Personal Identity Verification Authorizing Official
Personal Identity Verification Card
Personal Identity Verification-Interoperable
Personal Information Management
Personal Information Management Applications
Personal Information Management Data
Personal Protective Equipment
Personalization String
Personally Identifiable Information
Personnel Registration Manager
Personnel Security (NIST SP 800-53 security control family)
Personnel-Security Compromise
PFS
PGP
Pharming
PHI
Phishing
PHM
Photo Eye
PHY
Physical Access Control System
Physical And Environmental
Physical And Environmental Protection (NIST SP 800-53 security control family)
Physical Destruction
Physical Layer
Physical Network Interface Card
Physical Partitioning
Physical Protection
Physical Safeguards
Physical Security
Physically Isolated Network
Physically Protected Space
Physical-Security Compromise
PI
PIA
Piconet
PID
PII
Pii Confidentiality Impact Level
PIM
PIM Applications
PIM-SM
PIN
Pin Unblocking Key
PIP
Pipeline
PIR
PIT
PIV
Piv Assurance Level
Piv Card
PIV Card Issuer
Piv Credential
Piv Key Type
PIV-I
PIX
Pixels Per Inch
PKC
PKCS
PKE
PKI
Pki Sponsor
PKI-AUTH
PKI-CAK
PKI-Card Authentication Key
PKI-PIV Authentication Key
PKIX
PKM
PKMv1
PKMv2
PL
Plain Text
Plaintext
Plaintext Data
Plaintext Key
Plan Coordinator
Plan Of Action & Milestones
Plan Of Action And Milestones
Plan Of Actions And Milestones
Plane
Plane(j)
Planning
Planning (NIST SP 800-53 security control family)
Plans Of Action And Milestones
Plant
Platform Architecture Layer
Platform As A Service
Platform It
Platform It System
Platform-As-A-Service
PLC
PM
PMA
PMK
PMKSA
PMP
PMTU
PN
PNG
pNIC
PoA
POA&M
POAM
POC
PoE
Point Of Attachment
Point Of Contact
Point Of Presence
Point-To-Multipoint
Point-To-Point
Point-To-Point Protocol
Point-To-Point Tunneling Protocol
Poisson Distribution
Policy
Policy Administration Point
Policy Based Access Control
Policy Decision Point
Policy Enforcement Point
Policy Information Point
Policy Management Authority
Policy Mapping
POP
POP3
Popup Window
Port
Port Scan
Port Scanner
Port Scanning
Portable Data File
Portable Electronic Device
Portable Network Graphics
Portable Storage Device
Portal
Portal VPN
Positive Control Material
Possession And Control Of A Token
POST
Post Office Protocol
Post Office Protocol 3
Post-Implementation Review
Potential Impact
Potential Routers List
Power Over Ethernet
Power-On Self-Test
PP
PPE
PPI
PPP
PPS
PPTP
PPVPN
PRA
Practice Statement
Pre-Activation State
Pre-Boot Authentication
Pre-Boot Environment
Preboot Execution Environment
Precursor
Prediction Resistance
Predisposing Condition
Pre-EFI Initialization
Preferred Address
Preimage
Preimage Resistance
Pre-PAK
Pre-Primary Authorization Key
Prerequisite
Pre-Shared Key
Pre-shared-key
President’s Council On Integrity And Efficiency
President’s Management Agenda
Pressure Regulator
Pressure Sensor
Pretty Good Privacy
PRF
PRF(s, x)
Primary Facility
Primary Services Node
Primary System
Prime Number
Prime Number Generation Seed
Primitive
Principal Accrediting Authority (C.F.D.)
Principal Authorizing Official
Principal CA
Principle
Printer
Prior Year
PRISMA
Privacy
Privacy Act Statement
Privacy Capability
Privacy Control Assessment
Privacy Control Assessor
Privacy Control Enhancements
Privacy Control Inheritance
Privacy Enhanced Mail
Privacy Impact Assessment
Privacy Key Management
Privacy Key Management Protocol Version 1
Privacy Key Management Protocol Version 2
Privacy Plan
Privacy Requirements
Privacy Threshold Analysis
Private Branch Exchange
Private Cloud
Private Credentials
Private Key
Private Key/Private Signature Key
Private-Key-Possession Assurance Message
Privilege
Privilege Attribute Certificate
Privilege Certificate Manager
Privileged Account
Privileged Accounts
Privileged Command
Privileged Process
Privileged User
PrivKeyU, PrivKeyV
PRL
PRM
PRNG
Proactive Cyber Defense
Probabilistic Signature Scheme
Probability Density Function
Probability Distribution
Probability Of Occurrence
Probable Prime
Probative Data
Probe
Probe Request
Probe Response
Process
Process Controller
Process Hijacking
Procurement
Producer
Product Compliant List
Product Source Node
Professional Development
Professionalization
Profile
Profile (for a CKMS)
Profile (for an FCKMS)
Profile Augmentations
Profile Features
Profile Requirements
Profiling
Prognostics and Health Management
Program Management
program manager
Program Policy
Program Review For Information Security Management Assistance
Programmable Logic Controller
Programmable Read-Only Memory
PROM
Promiscuous Mode
Proof Of Possession
PROPIN
Proportional – Integral - Derivative
Proprietary Identifier Extension
Proprietary Information
Proscribed Information
Protect Data
Protected Access
Protected Access Credential
Protected Ciphersuite Negotiation
Protected Communication
Protected Critical Infrastructure Information
Protected Distribution System
Protected Extensible Authentication Protocol
Protected Health Information
Protected Mode
Protected Session
Protection Philosophy
Protection Profile
Protection Suite
Protective Distribution System
Protective Packaging
Protective Technologies
Protocol
Protocol Adaptation Layer
Protocol Analyzer
Protocol And Parameters Selection
Protocol Independent Multicast
Protocol Independent Multicast—Sparse Mode
Provable Prime
Provenance
Provider
Provider Independent
Provisioner-Provided VPN
Proximity Sensor
Proxy
Proxy Agent
Proxy Server
PRSN
PS
Pseudo Random Number Generator
Pseudonym
Pseudonyms
Pseudorandom
Pseudorandom Function
Pseudo-Random Function
Pseudorandom Key
Pseudorandom Number Generator
Pseudo-Random Number Generator
PSK
PSN
PSS
PSTN
PTA
PTK
PTT
PUB
PubKeyU, PubKeyV
Public Cloud
Public Credentials
Public Domain Software
Public Information
Public Internet Registry
Public Key
Public Key Certificate
Public Key Cryptographic Algorithm
Public Key Cryptographic Algorithm (asymmetric)
Public Key Cryptographic Standards
Public Key Cryptography
Public Key Cryptography Standard
Public Key Enabling
Public Key Infrastructure
Public Key Infrastructure for X.509 Certificates
Public Key/Public Signature Verification Key
Public Law
Public Reviewer
Public Seed
Publication
Public-Key
Public-Key Algorithm
Public-Key Certificate
Public-Key Cryptographic Algorithm
Public-Key Cryptography
Public-Key Cryptography Standards
Public-Key Infrastructure
Public-Key Validation
PUK
Pulverization
Purge
purpose
Push-To-Talk
P-Value
PVM
PXE
PY