PBKDF2 (Password Based Key Derivation Function 2): Password Based Key Derivation Function 2
PCI DSS: Payment Card Industry Data Security Standard
Penetration testing: The practice of attempting to break into a system or network to verify the systems in place
PGP (Pretty Good Privacy) encryption: An encryption application that allows authentication of data along with privacy from third parties relying upon asymmetric encryption to achieve this
Phishing attack: It usually occurs when a malicious email is sent to a victim disguised as something legitimate
Physical tokens: They take a few different forms, such as a USB device with a secret token on it, a standalone device which generates a token, or even a simple key used with a traditional lock
PIN authentication method: It uses PINs that are eight-digits long, but the last digit is a checksum that's computed from the first seven digits
Ping flood: It sends tons of ping packets to a system. If a computer can't keep up with this, then it's prone to being overwhelmed and taken down
PKI system: A system that defines the creation, storage and distribution of digital certificates
Platform key: It's the public key corresponding to the private key used to sign the boot files
Port mirroring: Allows the switch to take all packets from a specified port, port range, or the entire VLAN and mirror the packets to a specified switch port
Post-fail analysis
Pre-shared key:It's the Wi-Fi password you share with people when they come over and want to use your wireless network
Principle of least privilege: Helps to ensure that sensitive data is only accessed by people who are authorized to access it
Privacy policies: Oversees the access and use of sensitive data
Promiscuous mode: A type of computer networking operational mode in which all network data packets can be accessed and viewed by all network adapters operating in this mode