The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

P

Polyinstantiation

Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks. It may also indicate, such as in the case of database polyinstantiation, that two different instances have the same name (identifier, primary key).

Letter for filtering (will be hidden in prod) :

P

Port

A port is an end point of communication in an operating system. It is identified for each address and protocol by a 16-bit number, commonly known as the port number.

Letter for filtering (will be hidden in prod) :

P

Personal Firewall

Personal firewalls are those firewalls that are installed and run on individual computers. A personal firewall is an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy. Typically it works as an application layer firewall.

Letter for filtering (will be hidden in prod) :

P

Proxy Server

A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion. Most proxies are web proxies, facilitating access to content on the world wide web and providing anonymity.

Letter for filtering (will be hidden in prod) :

P

Password Authentication Protocol (PAP)

Password authentication protocol (PAP) is the most basic form of authentication in which a user’s name and password are transmitted over a network and compared to a table of name-password pairs. The basic authentication feature built into the HTTP protocol uses PAP.

Letter for filtering (will be hidden in prod) :

P

Poison Reverse

Poison reverse is a method where the gateway node communicates to its neighbor gateways that one of the gateways is no longer connected. The notifying gateway sets the number of hops to the unconnected gateway to a number that indicates “infinite”. In effect, advertising the fact that their routes are not reachable.

Letter for filtering (will be hidden in prod) :

P

Password Cracking

Password cracking is the process of trying to guess or crack passwords to gain access to a computer system or network. Crackers generally use a variety of tools, scripts, or software to crack a system password. Password cracks work by comparing every encrypted dictionary word against the entries in the system password file until a match is found.

Letter for filtering (will be hidden in prod) :

P

Program Policy

A program policy is a high-level policy that sets the overall tone of an organization’s security approach.

Letter for filtering (will be hidden in prod) :

P

Possession

Possession is the holding, control, and ability to use information.

Letter for filtering (will be hidden in prod) :

P

Packet Switched Network (PSN)

A packet switched network (PSN) is a computer communications network that groups and sends data in the form of small packets. It enables sending of data packets between a source and destination node over a channel that is shared between multiple users and/or applications. A packet switch is also known as a connectionless network, as it does not create a permanent connection between a source and destination node.