АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Packet filteringParameterized queriesParserPartyPassive adversary, eavesdropperPassive adversary, eavesdropperPassive attackPassive threatPasswordPassword attackPassword crackerPassword crackingPassword-based authenticated key exchange, PAKEPatchPayment systemPayment transaction (protocol)Peer entity authentication servicePeer-to-peer LANPeer-to-peer network, P2PPenetrationPenetration testPentesterPerfect cipherPerfect secrecyPerfect secret sharing schemePerfect zero-knowledge proofPermutation cipherPersonal dataPersonal data disseminationPersonal data processingPersonal data protectionPersonal data transborder transmissionPersonal identification number (PIN)PhishingPhysical and data layer cryptographic mechanismPhysical securityPlain text modelPlaintextPlaintext, cleartextPolymorphic virusesPotentially unwanted programs (PUPs), unwanted softwarePractical security (of the cryptosystem)Preliminary key distribution schemePrimitive cryptographic protocolPrivacyPrivate communication channelPrivate networkPrivate-key cryptosystemPrivilege matrix)Privilege violationPrivileged userProactive monitoringProcessed biometric sampleProductProgramProgram bug, malicious logicProgram verificationProgram viabilityProof of knowledgeProprietary standardProtected automated systemProtected information resourceProtection class of computer systemProtection continuityProtection criterion of computer systemProtection facilityProtection from unauthorized accessProtection level certificationProtection modelProtection of informationProtection profileProtection, security, lock outProtocolProvable securityPseudo-random sequencePseudorandom function familyPseudorandom function generatorPseudorandom generatorPseudorandom permutation familyPseudorandom permutation generatorPublic keyPublic key distributionPublic key infrastructure (PKI)Public networkPublic personal dataPublic-key cryptosystemPublic-key cryptosystem, asymmetric cryptosystem