Glossary

A B C D E F H I K L M N P R S T U V W Z
Proxy Server

A proxy server is another computer system which serves as a hub through which internet requests are processed.

Pre-texting

Pre-texting is the act of creating a fictional narrative or pretext to manipulate a victim into disclosing sensitive information.

Policy Management

Policy Management is the process of creating, communicating, and maintaining policies and procedures within an organisation.

Phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Personal data

Data relating to a person whose identity can be identified by them.

Penetration testing

Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit.

Patch

A patch is a piece of software code that can be applied after the software program has been installed to correct an issue with that program.

Password

A secret series of characters used to authenticate a person.

Padlock

A padlock icon displayed in a web browser indicates a secure mode where communications between browser and web server are encrypted.

Packet Sniffer

Software designed to monitor and record network traffic.