Glossary P
- Pseudonymization
- Privacy
- PIN
- Pseudonym
- PSK
- Perimeter
- Packet
- Packet Filter
- Packet Filtering
- Packet Sniffer
- Parity
- Parity Bit
- Partition
- Passive Attack
- Passive Security Testing
- Passphrase
- Password
- Password Cracking
- Patch
- Patch Management
- Phishing
- Plain text
- POODLE attack
- Payload
- Penetration Testing
- Permission
- Physical Access Control ...

Pseudonymization
A particular type of de-identification that both removes the association with a data subject and adds an association between a particular set of characteristics relating ...
Packet Filter
A routing device that provides access control functionality for host addresses and communication sessions. See NIST SP 800-41 Rev. 1 for more information. Specifies which types of traffic should ...
Packet Filtering
See “Packet Filtering”. See NIST SP 800-41 Rev. 1 under Stateless Inspection for more information.
Packet Sniffer
Software that observes and records network traffic. Software that monitors network traffic on wired or wireless networks and captures packets. See NIST SP 800-86 under Packet Sniffer for more information.
Parity Bit
A checksum that is computed on a block of bits by computing the binary sum of the individual bits in the block and then discarding ...
Passive Attack
An attack against an authentication protocol where the attacker intercepts data traveling along the network between the claimant and verifier, but does not alter the ...
Passive Security Testing
Security testing that does not involve any direct interaction with the targets, such as sending packets to a target. See NIST SP 800-115 for ...
Passphrase
A passphrase is a memorized secret consisting of a sequence of words or other text that a claimant uses to authenticate their identity. A passphrase ...
Password Cracking
The process of recovering secret passwords stored in a computer system or transmitted over a network. See NIST SP 800-115 for more information.
Patch Management
The systematic notification, identification, deployment, installation, and verification of operating system and application software code revisions. These revisions are known as patches, hot fixes, and ...
Plain text
Plain text is simple text displayed in a readable format. Encryption converts plain text to ciphertext.The following graphic shows how plain text is converted to ...
POODLE attack
Padding Oracle on Downgraded Legacy Encryption. POODLE is referred to as both a downgrade attack, and a man-in-the-middle (MITM) exploit. It essentially forces a TLS ...
Penetration Testing
A method of testing where testers target individual binary components or the application as a whole to determine whether intra or intercomponent vulnerabilities can be ...