|
Letter: P - passive attack
- Definition: An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, its data, or its operations.
- password
- Definition: A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- pen test
- Definition: A colloquial term for penetration test or penetration testing.
- penetration
- Synonym(s): intrusion
- penetration testing
- Definition: An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.
- personal identifying information / personally identifiable information
- Definition: The information that permits the identity of an individual to be directly or indirectly inferred.
- phishing
- Definition: A digital form of social engineering to deceive individuals into providing sensitive information.
- plaintext
- Definition: Unencrypted information.
- Related Term(s): ciphertext
- precursor
- Definition: An observable occurrence or sign that an attacker may be preparing to cause an incident.
- Related Term(s): indicator
- preparedness
- Definition: The activities to build, sustain, and improve readiness capabilities to prevent, protect against, respond to, and recover from natural or man made incidents.
- privacy
- Definition: The assurance that the confidentiality of, and access to, certain information about an entity is protected.
- Extended Definition: The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- private key
- Definition: A cryptographic key that must be kept confidential and is used to enable the operation of an asymmetric (public key) cryptographic algorithm.
- Extended Definition: The secret part of an asymmetric key pair that is uniquely associated with an entity.
- Related Term(s): public key, asymmetric cryptography
- protect & defend
- Definition: A NICE Framework category consisting of specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.
- From: NICE Framework
- public key
- Definition: A cryptographic key that may be widely published and is used to enable the operation of an asymmetric (public key) cryptographic algorithm.
- Extended Definition: The public part of an asymmetric key pair that is uniquely associated with an entity and that may be made public.
- Related Term(s): private key, asymmetric cryptography
- public key cryptography
- Definition: A branch of cryptography in which a cryptographic system or algorithms use two uniquely linked keys: a public key and a private key (a key pair).
- Synonym(s): asymmetric cryptography, public key encryption
- public key encryption
- Synonym(s): public key cryptography
- public key infrastructure
- Definition: A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the Internet.
- Extended Definition: A framework and services for generating, producing, distributing, controlling, accounting for, and revoking (destroying) public key certificates.
|
|
|