Security Finder Glossar

 

  • PA
  • Packet Sniffer
  • Pandemie
  • Par-Spread-Kurve
  • Parallele Koordinaten Visualisierung
  • Pareto-Diagramm
  • Password
  • Password Authenticated Connection Establishment (PACE)
  • Password Protected
  • Passwort
  • PDCA-Zyklus
  • Penetrationstest
  • Perimeterisation
  • Personal Identification Number – (PIN)
  • Personal Identity Verification Authorizing Official
  • Personal Identity Verification Card – (PIV Card)
  • Personal Identity Verification Issuance Authority
  • Pervasive Computing
  • PETN
  • Phantomrisiken
  • Phishing / Spear phishing
  • PKK
  • PNOS
  • Policy
  • Port scan
  • Portfolio-Analyse
  • Potential Impact
  • Pre-Shared Key
  • Private Peering
  • Probabilistische Risiko-Analyse
  • Produkthaftung
  • Protection profile
  • Provision
  • Proxy
  • Prozess (Ablauforganisation)
  • Prudenzielle Aufsicht
  • Pseudonymisierung
  • PV LAN
  • Proxy

    A proxy is an application that "breaks" the connection between client and server. The proxy accepts certain types of traffic entering or leaving a network and processes it and forwards it. This effectively closes the straight path between the internal and external networks. Making it more difficult for an attacker to obtain internal addresses and other details of the organization's internal network. Proxy servers are available for common Internet services; for example, an Hyper Text Transfer Protocol (HTTP) proxy used for Web access, and an Simple Mail Transfer Protocol ( SMTP) proxy used for e-mail. SOURCE: SP 800-44

    ANBIETER/PARTNER
    Experten- und Marktplattformen
    Cloud Computing

    Technologie-Basis zur Digitalisierung

    mehr
    Experten- und Marktplattformen
    • company
    • company
    • company
    • company
    • company
    Values Blogs