P Flashcards
P12
PKCS #12
This format allows for the storage of both public and
private keys in open or encrypted form.
P2P
Peer to Peer
A headless file sharing system that has no centralized
point of control and facilitates wide-open file sharing.
PaaS
Platform as a Service
A form of access that allows an organization to create
and run its own applications on the cloud.
PAC
Proxy Auto Configuration
A JavaScript based technology that regulates the
configuration of browsers and their use of web proxies.
PAM
Pluggable Authentication Modules
Dynamically, loadable authentication libraries used on
Linux.
PAP
Password Authentication Protocol
This is an insecure authentication protocol, sometimes
used between routers.
PAT
Port Address Translation
Address translation that multiplexes many internal
addresses through one or a few external address, linking
connections based upon the source port.
Patch
management
Configuration and baseline maintenance
An application designed to identify compliance
deviations and variance from a baseline, and then rectify
it.
PBKDF2
Password-based Key Derivation Function 2
This cryptographic function, processes, and otherwise
insecure secret through repeated rounds of hashing to
create a longer key value.
PBX
Private Branch Exchange
The point of interface between the public switched
telephone network and an organization’s internal
telephony.
PCAP
Packet Capture
Sniffing and recording network data into a file for later
analysis.
PCI DSS
Payment Card Industry Data Security Standard
A nongovernmental security standard that regulates the
implementation and security of web payment gateways.
PDU
Power Distribution Unit
This is a multiple output device that regulates the power
supply and its quality to multiple devices within a rack
of devices in a data center.
PE
Portable Executable
This is a format for code run by Windows systems and
32 or 64 bit mode.
PEAP
Protected Extensible Authentication Protocol
An EAP form that sends MSCHAP credentials secured
within a TLS envelope.
PED
Portable Electronic Device
Small electronics, such as beepers, calendars and note
applications used prior to smartphones.
PEM
Privacy-enhanced Electronic Mail
This is one of the oldest formats of certificates and uses
Base64.
PFS
Perfect Forward Secrecy
This is the property of Key management where in the
loss of one key is not in danger data encrypted with
earlier session keys.
PFX
Personal Exchange Format
A binary format for storing or sending server certificates
and private keys.
PGP
Pretty Good Privacy
A widely used cryptosystem initially used for securing
email by encryption and digital signatures.
PHI
Personal Health Information
Typically sensitive information regarding the health of
an individual.
Phishing
Malicious spam
Bogus messaging sent to a wide array of potential
targets.
PII
Personally Identifiable Information
This is data or pieces of data that uniquely correspond to
or identify one individual and requires special handling.
PIN
Personal Identification Number
Knowledge-based authentication using a single value or
number.