PaaS (Platform as a Service)
- a cloud computing model where a third-party provider delivers hardware and software tools to users over the internetpassive attack
- An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, its data, or its operations.password
- A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.passwordless
- an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secretpen test
- A colloquial term for penetration test or penetration testing.penetration testing
- An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.Pentester (Penetration tester)
- An information security expert who performs penetration testspersonal identifying information / personally identifiable information
- The information that permits the identity of an individual to be directly or indirectly inferred.phishing
- A digital form of social engineering to deceive individuals into providing sensitive information.PIV
- an identification card issued by a federal agency that contains a computer chip, which allows it to receive, store, recall, and send information in a secure methodplaintext
- Unencrypted information.precursor
- An observable occurrence or sign that an attacker may be preparing to cause an incident.preparedness
- The activities to build, sustain, and improve readiness capabilities to prevent, protect against, respond to, and recover from natural or manmade incidents.privacy
- The assurance that the confidentiality of, and access to, certain information about an entity is protected.private key
- A cryptographic key that must be kept confidential and is used to enable the operation of an asymmetric (public key) cryptographic algorithm.protect & defend
- A NICE Framework category consisting of specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.Proxyjacking
- a malicious technique where an attacker gains control over a target's proxy server, allowing them to intercept and manipulate the targets internet trafficPTaaS
- a hybrid solution that combines the breadth of automation with the depth of human assessment, while integrated with advanced vulnerability management and analyticspublic key
- A cryptographic key that may be widely published and is used to enable the operation of an asymmetric (public key) cryptographic algorithm.public key cryptography
- A branch of cryptography in which a cryptographic system or algorithms use two uniquely linked keys: a public key and a private key (a key pair).public key infrastructure
- A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the Internet.