A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

P

P2P

Peer-to-peer

Pacific Cyber Security Operational Network (PaCSON)

A multinational Pacific cyber security network which the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) is a member of. PaCSON promotes closer sharing of cyber security threat information, tools, techniques and ideas between Pacific nations.

Passive defence

Security measures that are applied within a network and require limited human interaction. Passive defence includes logging and monitoring mechanisms, and implementation of tools and processes to harden networks including firewalls, application hardening, patching procedures and antivirus software.

Passphrase

A sequence of words used for authentication.

Password

A sequence of characters used for authentication.

Password complexity

The use of different character sets, such as lower-case alphabetical characters (a-z), upper-case alphabetical characters (A-Z), numeric characters (0-9) and special characters.

Password manager

A type of software that offers greater security through the capability to generate unique, strong, easily-changed passwords for all online accounts and the secure encrypted storage of those passwords either through a local or cloud-based vault.

Password spray attack

An attack that attempts to access a large number of accounts with some commonly-used passwords.

Passwordless authentication

Authentication that does not involve the use of something users know. Passwordless authentication may be single-factor or multi-factor, with the later often referred to as passwordless multi-factor authentication.

Passwordless multi-factor authentication

Multi-factor authentication using something users have that is unlocked by something users know or are. Note, while a memorised secret may be used as part of passwordless multi-factor authentication (e.g. to unlock access to a cryptographic private key stored on a device) it is not the primary authentication factor, hence the use of the passwordless terminology.

Patch

A piece of software designed to remedy vulnerabilities or improve the usability or performance of software, IT equipment or OT equipment.

Patch cable

A metallic (copper) or fibre-optic cable used for routing signals between two components in an enclosed container or rack.

Patch panel

A group of sockets or connectors that allow manual configuration changes, generally by means of connecting patch cables.

Patching

The action of updating, fixing, or improving a computer program.

Payload

Part of digitally transmitted data that is the fundamental purpose of the transmission. In the cyber-security context, normally the part of a malware program that performs a malicious action.

Peer-to-peer (P2P) file sharing network

A decentralised file sharing system. Files are stored on and served by the personal computers of the users.

Penetration test

A penetration test is designed to exercise real-world scenarios in an attempt to achieve a specific goal, such as compromising critical systems, applications or data.

Perfect Forward Secrecy (PFS)

Additional security for security associations ensuring that if one security association is compromised subsequent security associations will not be compromised.

Peripheral switch

A device used to share a set of peripherals between multiple computers. For example, a keyboard, video monitor and mouse.

Personal data

Any information relating to an identified or identifiable natural person.

Personal identification number (PIN)

A number allocated to an individual and used to validate electronic transactions.

Personal information

Information or an opinion about an identified individual, or an individual who is reasonably identifiable: whether the information or opinion is true or not; and whether the information or opinion is recorded in a material form or not.

Personally Identifiable Information (PII)

Information that can be used on its own or with other information to identify, contact or locate a single person, or to identify an individual in context.

Pharming

A way of harvesting personal information, where a hacker puts a malicious code on your computer that redirects you to a fake site.

Phishing

Untargeted, mass emails sent to many people asking for sensitive information (such as bank details), encouraging them to open a malicious attachment, or visit a fake website that will ask the user to provide sensitive information or download malicious content.

See also 'spear phishing' and 'whaling'.

Plan of action and milestones (POAM)

A document that describes vulnerabilities in a system and the plans for their rectification.

PLC

Programmable logic controllers

PMK

Pairwise Master Key

Polymorphic

Malware that can change parts of its code in order to avoid detection by security software.

Pop-up

A small window which suddenly appears (pops-up) in the foreground of the normal screen.

Portable devices

Any device that can easily be carried. It is a small form factor computing device that is designed to be held and used in the hand.

Portable Document Format (PDF)

A file format that has captured all the elements as of a printed document as an electronic image that you can view, navigate, print or forward to someone else.

Position of trust

A position that involves duties that require a higher level of assurance than that provided by normal employment screening. In some cases, additional screening may be required. Positions of trust can include, but are not limited to, Chief Information Security Officers and their delegates, system administrators and privileged users.

Potentially unwanted software (PUS)

Applications that may appear to serve a useful purpose but often perform actions that may adversely affect a computer’s performance. Also known as potentially unwanted applications.

PowerShell

The shell framework developed by Microsoft for administrative tasks such as configuration management and automation of repetitive jobs.

Privacy

The ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

Privacy settings

Settings which control how a user's data is shared with other people or systems. Privacy settings apply to web browsers and social networking services.

Privileged Access Workstation (PAW)

Provides a dedicated operating system for sensitive tasks and is protected from internet attacks and threat vectors.

Privileged accounts

Privileged accounts include privileged user accounts and privileged service accounts.

Privileged operating environments

Privileged operating environments are those used for activities that require a degree of privileged access, such as system administration activities.

Privileged user

A user who can alter or circumvent a system’s security measures. This can also apply to users who could have only limited privileges, such as software developers, who can still bypass security measures.

A privileged user can have the capability to modify system configurations, account privileges, audit logs, data files or applications.

Privileged user accounts

A user account that has the capability to modify system configurations, account privileges, event logs and security configurations for applications. This also applies to users who may only have limited privileges but still have the ability to bypass some of a system’s controls.

Product

A generic term used to describe software or hardware.

Protection Profile (PP)

A document that stipulates the security functionality that must be included in a Common Criteria evaluation to meet a range of defined threats.

Protection Profiles also define the activities to be taken to assess the security function of an evaluated product.

Protective marking

An administrative label assigned to data that not only shows the value of the data but also defines the level of protection to be provided.

PSC

Protective Security Circular

PSPF

The Australian Government's Protective Security Policy Framework

Public computers

A computer available in public areas. Some places where public computers may be available are libraries, schools or government facilities.

Public data

Data that has been formally authorised for release into the public domain.

Public information

Information that has been formally authorised for release into the public domain.

Public Key Infrastructure (PKI)

A set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.

Public network infrastructure

Network infrastructure that an organisation has no control over, such as the internet.

Public Switched Telephone Network (PSTN)

Public network infrastructure used for voice communications.

Public Wi-Fi

Any Wi-Fi service established and owned by a contributing group that is provided for use by its customers on a wireless device.

Public Wi-Fi may be unsecured, password protected or have other secure authentication protocols established and managed by such contributing group.

See also unsecured networks.

Push-to-talk handsets

Handsets that have a button which is pressed by the user before audio can be communicated, thus providing off-hook audio protection.