Glossary of Cyber Security Terms
Essential Vocabulary for Navigating the World of Cyber Security
P
Packet
A packet is a courier in the digital world, carrying a fraction of a larger data set or message from source to destination. Characterized by the recipient's address, these packets, or datagrams, are the backbone of IP networks.
Packet-Switched Network
In the realm of packet-switched networks, data travels like hikers charting their own paths. Here, data is divided into units called packets, which find their way independently from source to destination.
Partitions
Think of partitions as the rooms within the house of hard disk storage. They are distinct sections that organize and separate the physical storage space.
Password Authentication Protocol (PAP)
PAP is like a basic padlock - simple but not very secure. This protocol involves users entering their password, which is then transmitted over the network, often without any form of encryption.
Password Cracking
Password cracking is the digital equivalent of lock-picking, a practice of guessing or decoding passwords using information from password files.
Password Sniffing
Password sniffing is like eavesdropping on a network, a covert activity usually carried out on a local area network (LAN) to capture passwords by passively listening to network traffic.
Patch and Patching
Patching is the act of applying bandaids to software bugs. A patch is an update issued by a software vendor to fix known bugs and issues, while patching is the process of applying these updates.
Payload
Payload refers to the cargo of a data transmission – the actual, functional data enclosed in a packet or other transmission unit.
Penetration and Penetration Testing
Penetration in cybersecurity is like a successful heist, representing unauthorized access to protected data by breaching a system's security measures. Penetration testing is the act of simulating such attacks to evaluate a network or system's security.
Permutation
In the world of cryptography, permutation is akin to a jigsaw puzzle, where the positions of characters within a text are rearranged to encrypt the message.
Personal Firewalls
Personal firewalls are like security guards for individual computers, regulating incoming and outgoing network traffic based on predetermined security rules.
Pharming and Phishing
Pharming is a sophisticated form of cyberattack, hijacking a user's online session to a counterfeit website, while phishing uses deceitful emails that seem trustworthy, tricking users into giving up their credentials on a fraudulent site.
Ping of Death, Ping Scan, and Ping Sweep
Ping of Death is a cyberattack that sends an oversized and improperly formed ping to crash a system. A Ping Scan checks networked devices' availability, and a Ping Sweep identifies potential targets for a cyberattack by sending ICMP echo requests to a range of IP addresses.
Plaintext
In cryptography, plaintext is the bare, unencrypted text or message that is readable and understandable without any need for decryption.
Point-to-Point Protocol (PPP) and Point-to-Point Tunneling Protocol (PPTP)
PPP is like a dedicated line, enabling a direct connection between two nodes, like a computer and a network server. PPTP extends the reach of private networks, creating private "tunnels" over the public internet.
Poison Reverse
Poison Reverse is a routing technique, marking unreachable destinations with an infinite metric, signifying these routes are not accessible.
Polyinstantiation and Polymorphism
Polyinstantiation in databases allows multiple records to share the same key, preventing inference attacks. Polymorphism in malware is a shape-shifting technique that continually alters the underlying code to evade detection.
Port and Port Scan
In computer networking, a port is like a dedicated post box, uniquely identifying a communication endpoint or a process on a machine. Port Scanning is a method used by attackers to identify potential network services for exploitation.
Possession
In terms of information security, possession is control and the ability to use specific information.
Post Office Protocol, Version 3 (POP3)
POP3 is like a digital post office, an internet protocol that lets client workstations access and retrieve mail messages stored on a server host.
Practical Extraction and Reporting Language (Perl)
Perl is a powerful scripting language, a Swiss army knife of Unix facilities, sporting a syntax similar to C.
Preamble
In network communications, a preamble is the green flag that synchronizes the transmission timing among different systems, ensuring they understand when data transfer begins.
Pretty Good Privacy (PGP)™
PGP is the secret handshake of the digital world, a software program that uses cryptography to protect email and other digital communications on the internet.
Private Addressing
Private addressing is the assignment of IP address ranges for private or non-Internet-connected networks, as specified in RFC 1918.
Program Infector and Program Policy
A program infector is a malware that attaches itself to existing executable files to propagate. A program policy, on the other hand, is a high-level directive setting the strategic direction for an organization's security program.
Promiscuous Mode
In networking, promiscuous mode is when a network device captures all packets, regardless of the intended recipient, much like an all-seeing CCTV camera.
Proprietary Information
Proprietary information is the business world's secret sauce, unique, non-public information giving a business a competitive edge.
Protocol and Protocol Stacks (OSI)
In telecommunications, a protocol is a rulebook dictating how data is exchanged between different devices, while protocol stacks are the collection of network protocol layers enabling communication between networked systems.
Proxy Server
A proxy server is the go-between in internet communications, an intermediary providing security, administrative control, and caching service between a client and the internet.
Public Key, Public Key Encryption, and Public Key Infrastructure (PKI)
The public key is the open part of a pair of cryptographic keys used for asymmetric cryptography. Public key encryption and PKI provide a framework for managing public key cryptography, facilitating secure, private data exchange over public networks.
Public-Key Forward Secrecy (PFS)
PFS is like an amnesia spell for cryptographic protocols, ensuring that a compromised long-term private key can't compromise a previously established session key.