password card
=
code card
AKIT
Inglise
Eesti
#
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
P
p-adic norm
P-box transformation
P2MP
P2P (1)
P2P (2)
P2P botnet
P2P network
P2PSIP
P3
p13n
PaaS
PAC file
PACE
pack (1)
package (1)
package (2)
package (3)
package (4)
package (5)
package diagram
package format
package manager
packaging (1)
packet
packet analyzer
packet capture
packet delay variation
packet filter
packet filtering
packet flow
packet logging
packet loss
packet monkey
packet repeater
packet sniffer
packet switching
packet-switched
PAD (1)
padding (1)
padding (2)
padding symbol
paddle
PAdES
padlock
padlocking
page description language
page fault
page hit
page out
page tag
pagination (1)
pagination (2)
pagination (3)
paging (1)
paging (2)
PAI (1)
Paillier cryptosystem
pain threshold
pair programming
pairing
pairing-based cryptography
pairwise coprime set
palm
palm print
PAM
PAN (1)
PAN (2)
PAN truncation
pancake coil
panel
panic alarm
panic button
panic content
paparazzo
paper size
par operator
parallel
parallel bus
parallel communication
parallel computing
parallel garbage collector
parallel processing
parameter
parameter association *
parameter list
parameter tampering
parameterize
parameterized class
parasitic virus
parent
parent network (1)
parent network (2)
parent node
parent type
parenthesis
Pareto analysis
Pareto chart
Pareto principle
Paris Convention
parity (1)
parity (2)
parity bit
parked domain
parse
parser
parsing
part-of-speech tagging *
partial derivative
partial knowledge
partial ordering (1)
partial ordering (2)
participant
participation
partition (1)
partition (2)
partition (3)
partition table
partitioning (1)
partner portal
partnering
partnership (1)
partnership (2)
party
pasigraphy (1)
Pasigraphy (2)
PASR
pass card
pass the hash
pass-the-hash attack
pass/fail criteria
passcode
passive attack
passive authentication
passive FTP
passive reconnaissance
passive response
passive threat
passive wiretapping
passphrase
passport
passport card
passthought
password
password attack
password blacklist
password card
password cracker
password cracking
password entropy
password generator
password hardening
password hash
password management
password manager
password policy
password protection
password spray
password synchronization
password verification
password verification data
password-authenticated key agreement
password-entangled key token
pastebin (1)
pastebin (2)
patch
patch cable
patch cord (1)
patch cord (2)
patch level
patch management
patch panel
patching (1)
patching (2)
patent
patent claims
patent declaration
patent statement and licensing declaration
patentable subject matter
patented subject matter
patenting
path
PATH
path coverage
path traversal
pattern
pattern area
pattern recognition
pause operation
Pawn Storm
pay for privacy
pay-per-click
pay-per-use
payload (1)
payload (2)
payment card
payment card number
paywall
payware
PbD
PBKDF2
PBNAC
PBX
PC (1)
PC (2)
PC blade
PC Cyborg Trojan
PCA
PCAP
PCB (1)
PCBC mode
PCI DSS
PCI Express
PCI SSC
PCI-E
PCIe
PCoIP
PDA (1)
PDCA model
PDD
PDF (1)
PDF (2)
PDH
PdM
PDM
PDoS attack
PDP (1)
PDT
PDU
PDV
peak time (1)
peak time (2)
peak time (3)
PEAP
pebi-
PED
peer assessment
peer certificate
peer cloud service
peer cloud service provider
peer entity
peer entity authentication
peer review (1)
peer review (2)
peer-to-peer attack
peer-to-peer file sharing
peer-to-peer network
peering
peering point
Pegasus (1)
Pegasus (2)
Pegasus (3)
Pegasus (4)
PEM
pen azimuth
pen elevation
pen rotation
pen tablet
pen test
pen testing
pen tilt along the x axis
pen tilt along the y axis
penetration
penetration signature
penetration testing
pentagon (1)
people aspects of business continuity
people at risk
peopleware
PEP (1)
per-hop behavior
percent complete
percussive maintenace
perfect backward secrecy
perfect forward secrecy
perfect secrecy
perfect security
perfective maintenance
performance (1)
performance (2)
performance (3)
performance appraisal
performance efficiency *
performance evaluation
performance feature
performance graph
performance management (1)
performance management (2)
performance parameter
performance report
performance reporting
performance test
perimeter
perimeter firewall
perimeter network
perimeter security
perimeterless security
periods processing
peripheral (1)
peripheral (2)
peripheral equipment
peripherals
Periscope Group
permalink
permanent cookie
permanent denial-of-service attack
permanent error
permissibility
permission
permissioned ledger
permissionless ledger
permit (1)
permit (2)
permutation
permutation cipher
permutation-based anonymization
perpetual license
persistence (1)
persistence (2)
persistent BIOS infection
persistent cookie
persistent data
persistent data structure
persistent memory
persistent storage
persistent store
persistent threat
persistent URL
person (1)
person (2)
person of interest
personal area network
personal biometric data
personal computer
personal data
Personal Data Protection Act (Estonia)
personal firewall
personal genetic data
personal identification code
personal information
personal name
personal risk
personal security (1)
personal security (2)
Personal Security (3)
personal service robot
personal trait
personalization
personally identifiable financial information
personally identifiable information
personnel
personnel department
personnel security
personnel skills record *
pertinent data
pervasive computing
PESQ
PET (1)
pet name (1)
peta-
Peter principle
Petri net
Petya
PFP (1)
pfSense
PGP
phablet
phage
pharming
PHB
phishing
phlashing
phone
phone banking
phone call
phone call record
phone cloning
phone communication
phone fraud
phone scam
phoneme
photo patch
photocopier
photoluminescense
Photuris
PHP
PHP object injection
phreaker
phreaking
physical access
physical access controls
physical architecture
physical asset
physical attack surface
physical layer
physical object
physical privacy
physical sector
physical security
physical threat
PIA
picklist
picklock
pico-
picocell
piconet
pictogram
picture processing
pidgin
pie chart
PIFI
pig butchering scam
pigeonnet
piggyback attack
piggybacking (1)
piggybacking (2)
piggybacking (3)
piggybacking (4)
piggybacking (5)
PII
PII controller
PII principal
PII processor
pillarbox
pilot project
pilot study (1)
pilot study (2)
pilot's licence
PIM
pin (1)
PIN calculator
PIN code
PIN entry device
PIN lock
PIN pad (1)
PIN pad (2)
pinboard
ping (1)
ping (2)
ping flood
ping of death
ping pong attack
ping sweep
ping time
pingback
pipeline (1)
pipeline (2)
piracy
pirated
pirated software
pitfall
pivot (1)
pivot (2)
Pivot (3)
pivot display
pivot table
pivoting
PivotX
pixel
pixel depth
pixel map
pixel value
PKCS
PKI
PL/SQL
placeholder
plagiarism
plain fingerprint image
plaintext (1)
plaintext (2)
plaintext injection attack
plaintext key
plan (1)
plan (2)
plane
Planguage
planned finish date
planned obsolescence
planned start date
planner (1)
planner (2)
planner (3)
planning
plastic
plastic binding
platen (1)
platen (2)
platform
platform as a service
platform capabilities type
platform independent
platform independent model *
platform specific model
plausibility
plausible deniability
playback attack
playbook
playground
PLC
pleasure (1)
plesiochronous
plug (1)
plug (2)
plug (3)
plug and play
pluggable authentication module
plugin (1)
plugin (2)
plugin (3)
PlugX
PMAC
PMBoK
PNAC
PNG
POC (1)
POC (2)
podcast
podslurping
PoE
POE
POI
point of contact
point of encryption
poInt of interest
point of order k (of an elliptic curve)
point of sale
point-numbering
point-to-multipoint communication
point-to-point
point-to-point key establishment
point-to-point security
Pointcheval-Stern signature
pointer (1)
pointer (2)
pointer record
pointer type
pointing device
polar chart
polarization
polarized light
police authority
policy
policy decision point
policy enforcement point
policy engine
policy interoperability
policy server
policy-based management
Polish notation
political privacy
politics
polling (1a)
polling (1b)
polling (2)
POLP
poly wheel
polycarbonates
polygraph (1)
polygraph (2)
polymorphic generator
polymorphic malware
polymorphic virus
polymorphism
polynomial (1)
polynomial (2)
polynomial equation
polynomial texture mapping
polysemyphobia
Ponzi scheme
pool of data
pop-under
pop-up
pop-up blocking
POP3
populate
population (1)
population (2a)
population (2b)
population (3)
pornado
pornography
pornware
port
port agility
port channel
port clearing
port filtering
port forwarding
port isolation
port knocking
port layer
port mirroring
port monitoring
port replicator
port scan
port scanner
port sweep
port trunking
portability
portable (1)
portable (2)
portable application
portable computer
portable computing device
portable data terminal
portal
portfolio
porting
portlet
portrait (1)
portrait (2)
POS
POS malware
position (1)
position (2)
position (3)
position (4)
position (5)
position (6)
position information
positional parameter
positive biometric claim
positive identification
positive semidefinite cone
positive semidefinite matrix
positive-definite bilinear form
possession factor
post dial delay
post office box
post-quantum cryptography
POST-redirect-GET
Post/Redirect/Get *
postal code
postamble breakpoint
postback URL
postcondition
postfix notation
postincident analysis
postmortem
postmortem dump
PostScript
posttest loop
posture (1)
posture (2)
potential digital evidence
potential improvement *
potential vulnerability
potentially unwanted software
POTS
POW
power (1)
power (2)
power (3)
power (4)
power (5)
power (6)
power (7)
power adapter
power analysis (1)
power brick
power cable *
power fingerprint
power fingerprinting
power harvester
power jack
power over Ethernet
power ratio (1)
power reset
power set
power strip
power supply
power usage effectiveness
power user
PP
ppc
PPD (1)
PPD (2)
PPP (1)
PPP (2)
PPP report
PPTP
practicality
practice (1)
practice run
PRADO (1)
PRADO (2)
prank
pre-alfa version
pre-image
pre-live
pre-shared key
pre-study
preamble
preamble breakpoint
precaution
precedence diagram
precedence relationship
precision
precomputation attack
precondition
preconfigured
precursor
predefined (1)
predefined (2)
predefined user profile
predetermined navigation
predicate
predicate logic
predict
predictability
predictable resource location
predicted ASC
predicted claim
prediction *
prediction application security rationale
prediction consumer
prediction framework
prediction initiator
predictive (1)
predictive (2)
predictive coding (1)
predictive coding (2)
predictive maintenance
predictive planning
predictive security
preemptive (1)
preemptive (2)
preference
preference for opt-in
preferences (1)
preferences (2)
prefix
prefix notation
prefix-free representation
preheader
preimage
preimage attack
preinstalled malware
preinstalled rootkit
preliminary design review
prelive
premaster secret
premises
prepaid
preparation (1)
preparation (2)
preparation for operation
preparedness
preproduction prototype
prerequisite
prescriptive rule
presence
presence information
presence server
presence technology
present value
presentable (1)
presentation (1)
presentation (2)
presentation (3)
presentation attack
presentation attack detection
presentation attack detection feature
presentation attack instrument
presentation layer
presentation mixer
presentation program
preservation
preserve (1)
press release
pretest loop
pretext
preventative
prevention
prevention of hazards and threats
preventive
preventive action
preventive maintenance
preview trailer
PRF
primary account number
primary actor
primary cloud service provider
primary domain
primary domain name
primary Ent
primary information structure
primary key
primary site
prime factorization
prime ideal
prime number
prime time
primitive
primitive type
principal (1)
principal (2)
principal (3)
principal (4)
principal (5)
principal (6)
principal (7)
principal (8)
principal component analysis
principal ideal
principle of factor sparcity
principle of least access
principle of least authority
principle of least privilege
principle of minimal privilege
print suppression (1)
print suppression (2)
print-through
printed circuit board
printed circuit module
printed documentation
printed RFID
printer (1)
printer (2a)
printer (2b)
printer (2c)
printer (3)
printer steganography
printout
prioritize (1)
prioritize (2)
prioritized activity
prioritized list
priority
priority call
PRISM
privacy
privacy budget
privacy by design (1)
privacy by design (2)
privacy engineering
privacy filter
privacy guarantee
privacy impact
privacy impact assessment
privacy notice
privacy policy
privacy principles
privacy problem
privacy statement
privacy-enhancing technology
private address
private branch exchange
private cloud
private element
private IP
private key
private key extraction algorithm
private key generator
private label
private network
private port
private security service provider
private service (1)
private set intersection
private type
private visa
private VLAN
privilege
privilege confusion
privilege elevation
privilege escalation
privilege management
privileged
privileged access
privileged account
privileged command
privileged identity management
privileged process
privileged user
PRNG
proactive routing
probabilistic logic
probabilistic reasoning
probability
probability density function
probability distribution
probability logic
probability measure
probability space
probability theory
probe (1)
probe (2)
problem and modification analysis
problem reduction
problem reporting
problem resolution
problem solving
problem-oriented language
procedural cohesion
procedural knowledge
procedure (1)
procedure (2)
procedure word
procedure-oriented language
proceeding system
process (1)
process (2)
process control device
process control system
process injection
process mining
processing
processing of personal data
processing of PII
processor (1)
processor (2)
processor box (1)
processor box (2)
procurement
procurement auction
procurement documentation
procurement language
procurement management plan
producer (1)
producer (2)
producer (3)
producer (4)
producibility
product (1)
product (2)
product (3)
product and service
product and service
product assurance
product catalog (1)
product catalog (2)
product catalogue (1) *
product catalogue (2)
product cipher
product code (1)
product code (2)
product fraud
product key
product operation (1)*
product operation (2)
product operation (3)
product operation (4)
product registration key
product scope
product supply engineer
product support
production (1)
production (2)
production (3)
production data *
production environment
production file format
production server
production version
production/manufacturing stage
productivity
productivity software
professional competence
professional secret
professional service robot
proficiency
profile
profiler
profiling
program (1a)
program (1b)
program (2)
program product
program-sensitive fault
programmable controller
programmable logic controller
programmatic
programming language
programming paradigm
progress report
progressive deployment
progressive web app
project
project charter
project definition
project engineer
project schedule network diagram
project statement
prologue
promiscuous mode
promote (1)
promote (2)
promote (3)
prompt
prompter
prong
proof (1)
proof (2)
proof (3)
proof (4)
proof (5)
proof (6)
proof of acceptance
proof of citizenship
proof of concept
proof of knowledge
proof of nationality (1)
proof of principle
proof of stake
proof of work (1)
proof of work (2)
proof theory
proofreader
propagate
property (1)
property (2)
property (3)
proportionality
proposal (1)
proposal (2) *
proposer
proposition (1)
proposition (2)
propositional calculus
proprietary format
proprietary information
proprietary privacy
proprietary software
proprietary standard
ProRat
protected session
protection (1)
protection (2)
protection by design (1)
protection by design (2)
protection profile
protection profile evaluation
protection requirement
protective cabinet
protector
Proteus
protocol
protocol analyser
protocol analysis
protocol data unit
protocol fuzzing
protocol model (1)
protocol model (2)
protocol specification
protocol stack
protocol state machine
protocol suite
prototype
prototype-based programming
prototyping
prove
provenance
provision (1)
provision (2)
provision (3)
provisional driving license
provisional passport
provisioning (1)
provisioning (2)
proword
prox card
proximity card
proximity sensor
proxy
proxy attack
proxy cache
proxy object
proxy pivoting
proxy server
proxy Trojan
PRP
PSAP
PSD2
pseudo-anonymization
pseudo-collision attack
pseudo-operation
pseudo-random
pseudo-random function
pseudo-random number
pseudo-random number generator
pseudo-random number sequence
pseudocode
pseudomessage *
pseudonym
pseudonymization
pseudonymized biometric data record
pseudonymous remailer
pseudostate
PSF
PSK
PSSP
PSTN
psychographics
psychological critical incident
psychological education (1)
psychological first aid
PTH attack
PTM
PTMP
PTP
PTR
PTT
public (1)
public (1a)
public (2)
public (3)
public (4)
public (5)
public API
public cloud
public cloud service provider
public confidence
public data
public domain data
public domain software
public element
public good
public information
Public Information Act (Estonia)
public interest (1)
public interest (2)
public key
public key certificate
public key encryption
public key information
public key infrastructure
public utility
public warning
public warning system
public web
public-key cryptography
public-private partnership
public-safety access point
public-safety answering point
publication (1)
publication (2)
publication (3)
publicly-vetted
publishing
PUC
PUE
PUK
pull protocol
pull request
pull technology
pulldown
pulse duration modulation
pulse position modulation
pulse width modulation
pulsing flood
pulsing zombie
pulverize
pump and dump
punctuation mark
Punycode
PUP
pupil
pupil centre
PureCrypter
purge (1)
purge (2)
purpose specification
purpose-built authentication tool
push authentication
push protocol
push technology
push verification
Putter Panda
puzzle (1)
puzzle (2)
puzzle (3)
PVLAN
pwa
PWM
pwn
Pwn2Own
PXE
pyramid scheme
pyranometer
Python
Toimub laadimine
password card
=
code card
Palun oodake...
Katkesta
Tõrge
password card
=
code card
Andmete allalaadimisel või töötlemisel esines tehniline tõrge.
Vabandame!
Sulge