Глоссарий по информационной безопасности

Packet filtering

Parameterized queries

Parser

Party

Passive adversary, eavesdropper

Passive adversary, eavesdropper

Passive attack

Passive threat

Password

Password attack

Password cracker

Password cracking

Password-based authenticated key exchange, PAKE

Patch

Payment system

Payment transaction (protocol)

Peer entity authentication service

Peer-to-peer LAN

Peer-to-peer network, P2P

Penetration

Penetration test

Pentester

Perfect cipher

Perfect secrecy

Perfect secret sharing scheme

Perfect zero-knowledge proof

Permutation cipher

Personal data

Personal data dissemination

Personal data processing

Personal data protection

Personal data transborder transmission

Personal identification number (PIN)

Phishing

Physical and data layer cryptographic mechanism

Physical security

Plain text model

Plaintext

Plaintext, cleartext

Polymorphic viruses

Potentially unwanted programs (PUPs), unwanted software

Practical security (of the cryptosystem)

Preliminary key distribution scheme

Primitive cryptographic protocol

Privacy

Private communication channel

Private network

Private-key cryptosystem

Privilege matrix)

Privilege violation

Privileged user

Proactive monitoring

Processed biometric sample

Product

Program

Program bug, malicious logic

Program verification

Program viability

Proof of knowledge

Proprietary standard

Protected automated system

Protected information resource

Protection class of computer system

Protection continuity

Protection criterion of computer system

Protection facility

Protection from unauthorized access

Protection level certification

Protection model

Protection of information

Protection profile

Protection, security, lock out

Protocol

Provable security

Pseudo-random sequence

Pseudorandom function family

Pseudorandom function generator

Pseudorandom generator

Pseudorandom permutation family

Pseudorandom permutation generator

Public key

Public key distribution

Public key infrastructure (PKI)

Public network

Public personal data

Public-key cryptosystem

Public-key cryptosystem, asymmetric cryptosystem