vocabularyO2P Flashcards
(44 cards)
Object
A collection of data and a collection of methods or functions that operate on that data.
Object
An entity that contains or controls data.
OFB
Output Feedback is a DES mode similar to CFB, but an XOR operation is performed with a randomly generated, encrypted 64-bit, plaintext value.
One-way Function
A generic function that is used for producing output values; input values cannot be exposed from those output values.
Online Backup
A backup type that is performed while the Web is being accessed. The database management system manufacturer provides the utility for this type of backup.
OOP
Object-oriented programming is a programming model that views a program as a collection of discrete objects.
OR
A binary math operator used in cryptography in which if neither of the input values are true or one, then the output is false, if either of the input values are one, then the output is true.
OTP
A One-Time Pad is a type of substitution cipher in which a random value is written on a pad and securely given to the intended recipient. The value is then used to encrypt the original message which is then sent separately. The OTP is then used to decrypt the message and is never used again. An OTP is the only known unconditionally secure cipher.
P
The 3DES plaintext.
Packet Filtering Router
The oldest and most common firewall architecture in which a firewall is placed between the trusted and untrusted networks and uses ACLs to filter the packets.
Packet Sniffer
A troubleshooting tool used on a network to examine packets and to isolate problems that could degrade the performance of the network.
Parallel Test
The second step of a DRP test that enables full processing functionality at an alternate site.
Patent
A property right granted by the U.S. government that protects the inventors right to exclusive control of the creation and distribution of an invention. To warrant a patent, the invention must be new, useful, and nonobvious. A patent lasts for 20 years and is non-renewable.
PEM
Privacy Enhanced Mail is a cryptography protocol that is a secure e-mail standard which specifies how to encrypt and exchange e-mail between different clients.
Penetration Testing
A legal hacking process of pretending to be a hacker, scanning and probing the systems to see if it can be accessed. A coordinated set of attacks to judge the vulnerability of a system.
Phreaks
A cracker whose main goal is to compromise telephone company systems in order to obtain free long distance services.
Physical Access Control
Physical implements such as hardware, a fence, or a locked door that stand between an attacker and the information system.
Physical Access Controls
Controls which limit physical access to hardware.
Physical Data Flow
The manner in which data messages actually travel down the OSI stack on a source machine, across the physical media, and up the OSI stack on the target machine.
Physical Layer
The layer of the ISO/OSI reference model that is completely hardware-oriented. The physical layer takes packets that come in to the data-link layer and transmits a bit stream to a physical medium which is where the actual connection to the wire takes place.
Physical Preventative Control
A control, such as a badge or access card, which stops something before it occurs.
Physical Security
A device that protects an organizations assets from physical threats.
Pipelining
The process which allows multiple actions to occur at a single time inside of the execution cycle.
Plaintext
The original, readable message that the receiver will see in the end.