Open Shortest Path First/OSPF
a link‑state interior routing protocol that builds a full network topology map and computes the shortest‑path routes using Dijkstra’s algorithm.
Operational Technology/OT
hardware and software that monitor or control physical devices, processes, and industrial infrastructure (e.g., SCADA, PLCs).
Over the Air/OTA
wireless delivery of software updates, configuration changes, or data to devices (cellular, Wi‑Fi, Bluetooth, satellite, etc.).
Open Vulnerability Assessment Language/OVAL
an XML‑based, community‑driven standard for encoding system configuration, patch, and vulnerability information for automated security testing.
PKCS #12/P12
a binary container format that stores a private key together with its associated X.509 certificate chain, usually protected by a password.
Peer to Peer/P2P
a decentralized network architecture where each node can act as both client and server, sharing resources directly with other peers.
Platform as a Service/PaaS
a cloud service model that provides a managed runtime environment, development tools, and infrastructure so developers can deploy applications without managing servers or OS layers.
Proxy Auto Configuration/PAC
a JavaScript file (proxy.pac) that browsers evaluate to determine dynamically which HTTP/HTTPS proxy to use for each requested URL.
Privileged Access Management/PAM (Privileged Access Management)
a set of policies, processes, and technologies that control, monitor, and audit the use of privileged accounts (admin, root, service accounts).
Pluggable Authentication Modules/PAM (Pluggable Authentication Modules)
a modular authentication framework (primarily on Linux/Unix) that stacks and configures multiple authentication methods (e.g., pam_unix, pam_ldap).
Password Authentication Protocol/PAP
a simple, clear‑text authentication method used in PPP and early Wi‑Fi that transmits usernames and passwords without encryption.
Port Address Translation/PAT
a variant of NAT that maps many private IP addresses to a single public IP address, distinguishing flows by using different source ports.
Password‑Based Key Derivation Function 2/PBKDF2
a key‑stretching algorithm that repeatedly applies a pseudorandom function (e.g., HMAC‑SHA‑256) to a password and salt to produce a derived cryptographic key.
Private Branch Exchange/PBX
an on‑premises telephone switching system that routes internal calls and connects to the public PSTN or VoIP networks.
Packet Capture/PCAP
a file format (commonly .pcap) that stores raw network packets captured by tools such as Wireshark or tcpdump for later analysis.
Payment Card Industry Data Security Standard/PCI DSS
a set of 12 high‑level requirements (with many sub‑requirements) that organizations handling cardholder data must implement to protect that data.
Power Distribution Unit/PDU
a rack‑mounted hardware device that distributes electrical power to multiple outlets and may provide monitoring, switching, or metering functions.
Protected Extensible Authentication Protocol/PEAP
an EAP method that tunnels a second‑factor authentication (e.g., MS‑CHAP v2) inside a TLS‑protected channel, providing mutual authentication without exposing credentials.
Personal Electronic Device/PED
any handheld or portable electronic gadget owned or used by an individual (smartphone, tablet, laptop, wearable, etc.).
Privacy Enhanced Mail/PEM
a text‑based encoding (Base64 with header/footer) for representing cryptographic objects such as X.509 certificates, private keys, or CSRs.
Perfect Forward Secrecy/PFS
a property of key‑exchange protocols (e.g., Diffie‑Hellman, ECDHE) whereby compromise of long‑term private keys does not enable decryption of past encrypted sessions.
Pretty Good Privacy/PGP
an encryption program and open standard (OpenPGP) that provides end‑to‑end confidentiality, integrity, and authentication using a hybrid of symmetric and asymmetric cryptography.
Personal Health Information/PHI
any individually identifiable health information protected under regulations such as HIPAA (medical records, treatment details, lab results).