Packet filtering

Padding

Parameterized queries

Parser

Partition

Party

Pass-the-hash

Passive adversary, eavesdropper

Passive adversary, eavesdropper

Passive attack

Passive threat

Password

Password attack

Password cracker

Password cracking

Password-based authenticated key exchange, PAKE

Patch

Payment system

Payment transaction (protocol)

Peer entity authentication service

Peer-to-peer LAN

Peer-to-peer network, P2P

Penetration

Penetration rate

Penetration test

Pentester

Perfect cipher

Perfect secret sharing scheme

Perfect security (of a ciphersystem)

Perfect zero-knowledge proof

Performance

Performance level

Permutation cipher

Personal data dissemination

Personal data processing, personally identifiable information processing

Personal data protection

Personal data transborder transmission

Personal data, personally identifiable information

Personal identification number (PIN)

Personal identification number (PIN)

Personally identifiable information controller

Personally identifiable information principal

Personally identifiable information processor

Phishing

Physical and data layer cryptographic mechanism

Physical security

PKI architecture

Plain text model

Plaintext

Plaintext key

Plaintext, cleartext, plaintext message

Policy

Policy administration point

Policy decision point

Policy enforcement point

Policy information point

Polymorphic viruses

Post-quantum cryptography

Potential vulnerability

Potentially unwanted programs (PUPs), unwanted software

Practical security (of the cryptosystem)

Pre-selection algorithm

Pre-selection error

Predictability

Preliminary key distribution

Preliminary key distribution scheme

Presentation effect

Primitive cryptographic protocol

Privacy

Privacy breach

Privacy controls

Privacy enhancing technology (PET)

Privacy impact assessment (PIA), privacy risk assessment

Privacy policy

Privacy preferences

Privacy principles

Privacy safeguarding requirements

Privacy stakeholder

Private communication channel

Private information retrieval (PIR)

Private key

Private network

Private-key cryptosystem

Privilege

Privilege matrix

Privilege violation

Privileged access management (PAM)

Privileged user

Proactive monitoring

Procedural knowledge

Process

Processed biometric sample

Product

Production data

Program

Program bug, malicious logic

Program verification

Program viability

Proof of knowledge

Proprietary standard

Protected automated system

Protected information resource

Protected resource

Protection class of computer system

Protection continuity

Protection criterion of computer system

Protection facility

Protection from unauthorized access

Protection level certification

Protection model

Protection of information

Protection profile

Protection, security, lock out

Protocol

Protocol for authentication and key establishment (AKE protocol)

Protocol transcript

Provable security

Provable security (for the information security task)

Pseudo-random sequence

Pseudonymization

Pseudorandom function family

Pseudorandom function generator

Pseudorandom generator

Pseudorandom permutation family

Pseudorandom permutation generator

Public client

Public key

Public key certificate

Public key certification

Public key distribution

Public key encryption

Public key information

Public key infrastructure (PKI)

Public network

Public personal data

Public-key cryptosystem

Public-key cryptosystem, asymmetric cryptosystem

Подписаться на новости BIS Journal / Медиа группы Авангард

Подписаться
Введите ваш E-mail

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных

05.05.2026
CISA и партнёры рекомендовали Zero Trust на основе конвергенции ИТ и ОТ
05.05.2026
Скамеры метят в экономически активных граждан
05.05.2026
Минцифры обсуждает с силовиками «белый список» на 5–9 мая
05.05.2026
Рост числа атак на КИИ: геополитика, щедрый даркнет, засилье нейросетей и бреши у партнёров
05.05.2026
В России активизируют молодёжные кибердружины и медиапатрули
04.05.2026
Роботы будут строить ЦОДы сами для себя
04.05.2026
Эксперты высоко оценили управление рисками, связанными с человеческим фактором
04.05.2026
KELA: Число DDoS-атак в мире увеличилось на 400%
04.05.2026
Cloud.ru предлагает облачные сервера с преднастроенным Keycloak
04.05.2026
Мнение: Среди российских аналогов Asus и Samsung есть «неплохие продукты»

Стать автором BIS Journal

Поля, обозначенные звездочкой, обязательные для заполнения!

Отправляя данную форму вы соглашаетесь с политикой конфиденциальности персональных данных