Sect. P


Packet
Packet filtering
Packet internet groper [PING]
Packet switching
Paper test
Parallel simulation
Parallel testing

 

 

 

 

 

 

 

 

Parity check
Partitioned file
Passive assault
Passive response
Password
Password cracker
Patch

 

 

 

 

 

 

 

 

 

Patch management
Payback period
Payload
Payment system
Payroll system
Penetration testing
Performance

 

 

 

 

 

 

 

 

 

Performance driver
Performance indicators
Performance management
Performance testing
Peripherals
Personal digital assistant [PDA]
Personal identification number [PIN]
Pervasive IS control
Phase of BCP

 

 

 

 

Phishing
Phreakers
Piggybacking
Plain old telephone service [POTS]
Plaintext
Platform as a Service [PaaS]
"PMBOK (Project Management Body of
Knowledge)"
Point-of-presence [POP]
Point-of-sale (POS) systems
Point-to-point Protocol [PPP]

Point-of-sale (POS) systems
Point-to-point Protocol [PPP]
Point-to-point Tunneling Protocol [PPTP]
Policy
Polymorphism (Objects)
Population
Port (Port number)
Port scanning
Portfolio

 

 

 

 



Posting
Preventive application control
Preventive control
Prime number
"PRINCE2 (Projects in a Controlled
Environment)"
Principle
Principle of least privilege/access
Privacy
Private branch exchange [PBX]
Private key
Private key cryptosystems

Privilege
Probe
Problem
Problem escalation procedure
Procedure
Process
Process goals
Process maturity assessment
Process maturity attribute
Production program

 

 

 

Production software
Professional competence
Professional judgement
Professional skepticism
Professional standards
Program
Program and project management office [PMO]
Program Evaluation and Review Technique [PERT]
Program flowchart
Program narrative

 

 

 

Project
Project management officer [PMO]
Project portfolio
Project team
Promiscuous mode
Protection domain
Protocol
Protocol converter
Protocol stack
Prototyping

 

 

 

 

 

Proxy server
Public key
Public key cryptosystem
Public key encryption
Public key infrastructure [PKI]
Public switched telephone network [PSTN]