Proxy Server |
A proxy server is another computer system which serves as a hub through which internet requests are processed. |
Pre-texting |
Pre-texting is the act of creating a fictional narrative or pretext to manipulate a victim into disclosing sensitive information. |
Policy Management |
Policy Management is the process of creating, communicating, and maintaining policies and procedures within an organisation. |
Phishing |
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. |
Personal data |
Data relating to a person whose identity can be identified by them. |
Penetration testing |
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. |
Patch |
A patch is a piece of software code that can be applied after the software program has been installed to correct an issue with that program. |
Password |
A secret series of characters used to authenticate a person. |
Padlock |
A padlock icon displayed in a web browser indicates a secure mode where communications between browser and web server are encrypted. |
Packet Sniffer |
Software designed to monitor and record network traffic. |