Packet
Packet filtering
Packet internet groper [PING]
Packet switching
Paper test
Parallel simulation
Parallel testing
Parity check
Partitioned file
Passive assault
Passive response
Password
Password cracker
Patch
Patch management
Payback period
Payload
Payment system
Payroll system
Penetration testing
Performance
Performance driver
Performance indicators
Performance management
Performance testing
Peripherals
Personal digital assistant [PDA]
Personal identification number [PIN]
Pervasive IS control
Phase of BCP
Phishing
Phreakers
Piggybacking
Plain old telephone service [POTS]
Plaintext
Platform as a Service [PaaS]
"PMBOK (Project Management Body of
Knowledge)"
Point-of-presence [POP]
Point-of-sale (POS) systems
Point-to-point Protocol [PPP]
Point-of-sale (POS) systems
Point-to-point Protocol [PPP]
Point-to-point Tunneling Protocol [PPTP]
Policy
Polymorphism (Objects)
Population
Port (Port number)
Port scanning
Portfolio
Posting
Preventive application control
Preventive control
Prime number
"PRINCE2 (Projects in a Controlled
Environment)"
Principle
Principle of least privilege/access
Privacy
Private branch exchange [PBX]
Private key
Private key cryptosystems
Privilege
Probe
Problem
Problem escalation procedure
Procedure
Process
Process goals
Process maturity assessment
Process maturity attribute
Production program
Production software
Professional competence
Professional judgement
Professional skepticism
Professional standards
Program
Program and project management office [PMO]
Program Evaluation and Review Technique [PERT]
Program flowchart
Program narrative
Project
Project management officer [PMO]
Project portfolio
Project team
Promiscuous mode
Protection domain
Protocol
Protocol converter
Protocol stack
Prototyping
Proxy server
Public key
Public key cryptosystem
Public key encryption
Public key infrastructure [PKI]
Public switched telephone network [PSTN]