Cybersecurity Terminology

ResourcesTerms & Definitions

PaaS (Platform as a Service)
- a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet
passive attack
- An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, its data, or its operations.
password
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
passwordless
- an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret
pen test
- A colloquial term for penetration test or penetration testing.
penetration testing
- An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.
Pentester (Penetration tester)
- An information security expert who performs penetration tests
personal identifying information / personally identifiable information
- The information that permits the identity of an individual to be directly or indirectly inferred.
phishing
- A digital form of social engineering to deceive individuals into providing sensitive information.
PIV
- an identification card issued by a federal agency that contains a computer chip, which allows it to receive, store, recall, and send information in a secure method
plaintext
- Unencrypted information.
precursor
- An observable occurrence or sign that an attacker may be preparing to cause an incident.
preparedness
- The activities to build, sustain, and improve readiness capabilities to prevent, protect against, respond to, and recover from natural or manmade incidents.
privacy
- The assurance that the confidentiality of, and access to, certain information about an entity is protected.
private key
- A cryptographic key that must be kept confidential and is used to enable the operation of an asymmetric (public key) cryptographic algorithm.
protect & defend
- A NICE Framework category consisting of specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.
Proxyjacking
- a malicious technique where an attacker gains control over a target's proxy server, allowing them to intercept and manipulate the targets internet traffic
PTaaS
- a hybrid solution that combines the breadth of automation with the depth of human assessment, while integrated with advanced vulnerability management and analytics
public key
- A cryptographic key that may be widely published and is used to enable the operation of an asymmetric (public key) cryptographic algorithm.
public key cryptography
- A branch of cryptography in which a cryptographic system or algorithms use two uniquely linked keys: a public key and a private key (a key pair).
public key infrastructure
- A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the Internet.
microsoft-logo
ibm-logo
dell-logo
hp-logo
sentinel-logo
vmware-logo
Skip to content