АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Packet filteringPaddingParameterized queriesParserPartitionPartyPass-the-hashPassive adversary, eavesdropperPassive adversary, eavesdropperPassive attackPassive threatPasswordPassword attackPassword crackerPassword crackingPassword-based authenticated key exchange, PAKEPatchPayment systemPayment transaction (protocol)Peer entity authentication servicePeer-to-peer LANPeer-to-peer network, P2PPenetrationPenetration ratePenetration testPentesterPerfect cipherPerfect secret sharing schemePerfect security (of a ciphersystem)Perfect zero-knowledge proofPerformancePerformance levelPermutation cipherPersonal data disseminationPersonal data processing, personally identifiable information processingPersonal data protectionPersonal data transborder transmissionPersonal data, personally identifiable informationPersonal identification number (PIN)Personal identification number (PIN)Personally identifiable information controllerPersonally identifiable information principalPersonally identifiable information processorPhishingPhysical and data layer cryptographic mechanismPhysical securityPKI architecturePlain text modelPlaintextPlaintext keyPlaintext, cleartext, plaintext messagePolicyPolicy administration pointPolicy decision pointPolicy enforcement pointPolicy information pointPolymorphic virusesPost-quantum cryptographyPotential vulnerabilityPotentially unwanted programs (PUPs), unwanted softwarePractical security (of the cryptosystem)Pre-selection algorithmPre-selection errorPredictabilityPreliminary key distributionPreliminary key distribution schemePresentation effectPrimitive cryptographic protocolPrivacyPrivacy breachPrivacy controlsPrivacy enhancing technology (PET)Privacy impact assessment (PIA), privacy risk assessmentPrivacy policyPrivacy preferencesPrivacy principlesPrivacy safeguarding requirementsPrivacy stakeholderPrivate communication channelPrivate information retrieval (PIR)Private keyPrivate networkPrivate-key cryptosystemPrivilegePrivilege matrixPrivilege violationPrivileged access management (PAM)Privileged userProactive monitoringProcedural knowledgeProcessProcessed biometric sampleProductProduction dataProgramProgram bug, malicious logicProgram verificationProgram viabilityProof of knowledgeProprietary standardProtected automated systemProtected information resourceProtected resourceProtection class of computer systemProtection continuityProtection criterion of computer systemProtection facilityProtection from unauthorized accessProtection level certificationProtection modelProtection of informationProtection profileProtection, security, lock outProtocolProtocol for authentication and key establishment (AKE protocol)Protocol transcriptProvable securityProvable security (for the information security task)Pseudo-random sequencePseudonymizationPseudorandom function familyPseudorandom function generatorPseudorandom generatorPseudorandom permutation familyPseudorandom permutation generatorPublic clientPublic keyPublic key certificatePublic key certificationPublic key distributionPublic key encryptionPublic key informationPublic key infrastructure (PKI)Public networkPublic personal dataPublic-key cryptosystemPublic-key cryptosystem, asymmetric cryptosystem