P
Package Manager: A tool that helps users install, manage, and remove packages or applications
Package: A piece of software that can be combined with other packages to form an application
packaged with Python.
Packet Capture (P-Cap): A file containing data packets intercepted from an interface
Packet Sniffing: The practice of capturing and inspecting data packets across a network
Packet: A piece of a message transmitted over a packet-switching network. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.
Parameter (Python): An object that is included in a function definition for use in that
Parrot: An open-source distribution that is commonly used for security
Parsing: The process of converting data into a more readable format
Passive Packet Sniffing: A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network
Password Attack: An attempt to access password-secured devices, systems,
Password Cracking: Password cracking is the process of attempting to guess passwords, given the password file information.
Password Sniffing: Passive wiretapping, usually on a local area network, to gain knowledge of passwords.
Patch Update: A software and operating system update that addresses security vulnerabilities within a program or product
Patch: A patch is a small update released by a software manufacturer to fix bugs in existing programs.
Patching: Patching is the process of updating software to a different version.
Payload: Payload is the actual application data a packet contains.
Payment Card Industry Data Security Standards (PCI DSS): Any cardholder data
Penetration Test (Pen Test): Penetration testing is used to test the external perimeter security of a network or facility. A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes.
Penetration: Gaining unauthorized logical access to sensitive data by circumventing a system’s protections.
PEP 8 Style Guide: A resource that provides stylistic guidelines for programmers
Peripheral Devices: Hardware components that are attached and controlled by the computer system
Permissions: The type of access granted for a file or directory
Personal Identifiable Information (PII): The information that permits the identity of an individual to be directly or indirectly inferred.
Phishing Kit: A collection of software tools needed to launch a phishing campaign
Phishing: The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. Typically the e-mail and the website look like they are part of a bank the user is doing business with.
Physical Attack: A security incident that affects not only digital but also physical
Physical Social Engineering: An attack in which a threat actor impersonates an
Ping of Death: A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB
Plaintext: Ordinary readable text before being encrypted into ciphertext or after being decrypted.
Playbook: A manual that provides details about any operational action
Policy: A set of rules that reduce risk and protect information
Port Filtering: A firewall function that blocks or allows certain port numbers to limit unwanted communication.
Port Scan: A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a “well-known” port number, the computer provides. Port scanning, a favorite approach of computer cracker, gives the assailant an idea where to probe for weaknesses. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed for weakness.
Port: A port is nothing more than an integer that uniquely identifies an endpoint of a communication stream. Only one process per machine can listen on the same port number. A software-based location that organizes the sending and receiving of data between devices on a network.
Post-incident Activity: The process of reviewing an incident to identify areas for
Potentially Unwanted Application (PUA): A type of unwanted software that is
Prepare: The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs
Prepared Statement: A coding technique that executes SQL statements before
Primary key: A column where every row has a unique entry
Principle of Least Privilege: Access and authorization to information only last long enough to complete a task or function.
Privacy Protection: The act of safeguarding personal information from unauthorized
Privacy: The assurance that the confidentiality of, and access to, certain information about an entity is protected.
Private Data: Information that should be kept from the public
Procedures: Step-by-step instructions to perform a specific security task
Process of Attack Simulation and Threat Analysis (PASTA): A popular threat
Programming: A process that can be used to create a specific set of instructions for a
Project (OWASP): A non-profit organization focused on improving software security
Proprietary Information: Proprietary information is that information unique to a company and its ability to compete, such as customer lists, technical data, product costs, and trade secrets.
Protect: A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats
Protected Health Information (PHI): Information that relates to the past, present, or
Protecting and Preserving Evidence: The process of properly working with fragile
Protocol Stacks (OSI): A set of network protocol layers that work together.
Protocol: A formal specification for communicating; an IP address is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at several levels in a telecommunication connection.
Proxy Server: A server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.
Public Data: Data that is already accessible to the public and poses a minimal risk to
Public Key Encryption: The popular synonym for “asymmetric cryptography”.
Public Key Infrastructure (PKI): A PKI (public key infrastructure) enables users of a basically unsecured public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates.
Public Key: The publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography.
Public-Key Forward Secrecy (PFS): For a key agreement protocol based on asymmetric cryptography, the property that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of the private keys is compromised in the future.
Python Standard Library: An extensive collection of Python code that often comes
« Back to Glossary Index