The Cyber Glossary: Comprehensive Cybersecurity Terms
Browse alphabetically or search directly for the cybersecurity terms your team needs right now.Learn more about our mission.
P
- p, q, dDefinition
- P25(Project 25)
- P2P(Peer-to-Peer)
- PaaS(Platform as a Service)
- Packet CaptureDefinition
- Passive AttackDefinition
- PasswordDefinition
- Password CrackingDefinition
- Password ProtectedDefinition
- Password-Based Key Derivation Function 2Definition
- PasswordlessDefinition
- PAT(Port Address Translation)
- PatchDefinition
- PCAST(President's Council of Advisors on Science and Technology)
- Pen Test(Penetration Test)
- PenetrationDefinition
- Penetration TestingDefinition
- PentesterDefinition
- PermissionDefinition
- PermissionlessDefinition
- PermissionsDefinition
- Personal Identifying Information / Personally Identifiable InformationDefinition
- PhishingDefinition
- PII(Personally Identifiable Information)
- PIV(Personal Identity Verification)
- plaintextDefinition
- POP3(Post Office Protocol version 3)
- Port Address TranslationDefinition
- Port ScanDefinition
- Port ScannerDefinition
- Port World-Wide NameDefinition
- Portable Document FormatDefinition
- Portable Electronic Device (PED)(Portable Electronic Device)
- Portable Network GraphicsDefinition
- PoS(Point of Sale)
- POST(Power-On Self-Test)
- Post Office Protocol, Version 3(POP3)
- PrecursorDefinition
- PreparednessDefinition
- PrivacyDefinition
- Private KeyDefinition
- Protect & DefendDefinition
- ProxyjackingDefinition
- PSK(Pre-Shared Key)
- PTaaS(Penetration Testing as a Service)
- Public and Private KeyDefinition
- Public Domain SoftwareDefinition
- Public InformationDefinition
- Public KeyDefinition
- Public Key CryptographyDefinition
- Public Key EncryptionDefinition
- Public Key InfrastructureDefinition