Privileged Process –
A computer process that is authorized (and, therefore, trusted) to perform security-relevant functions that ordinary processes are not authorized to perform.
Privileged User –
A user that is authorized (and, therefore, trusted) to perform security-relevant functions that ordinary users are not authorized to perform.
Probe –
A technique that attempts to access a system to learn something about the system.
Product Source Node (PSN) –
The Key Management Infrastructure core node that provides central generation of cryptographic key material.
Production Model –
INFOSEC equipment in its final mechanical and electrical form.
Profiling –
Measuring the characteristics of expected activity so that changes to it can be more easily identified.
Promiscuous Mode –
A configuration setting for a network interface card that causes it to accept all incoming packets that it sees, regardless of their intended destinations.
Proprietary Information (PROPIN) –
Material and information relating to or associated with a company's products, business, or activities, including but not limited to financial information; data or statements; trade secrets; product research and development; existing and future product designs and performance specifications; marketing plans or techniques; schematics; client lists; computer programs; processes; and know-how that has been clearly identified and properly marked by the company as proprietary information, trade secrets, or company confidential information. The information must have been developed by the company and not be available to the government or to the public without restriction from another source.
Protected Distribution System (PDS) –
Wire line or fiber optic system that includes adequate safeguards and/or countermeasures (e.g., acoustic, electric, electromagnetic, and physical) to permit its use for the transmission of unencrypted information through an area of lesser classification or control.
Protection Philosophy –
Informal description of the overall design of an information system delineating each of the protection mechanisms employed. Combination of formal and informal techniques, appropriate to the evaluation class, used to show the mechanisms are adequate to enforce the security policy.
Protection Profile –
Common Criteria specification that represents an implementation-independent set of security requirements for a category of Target of Evaluations (TOE) that meets specific consumer needs.
Protective Distribution System –
Wire line or fiber optic system that includes adequate safeguards and/or countermeasures (e.g., acoustic, electric, electromagnetic, and physical) to permit its use for the transmission of unencrypted information.
Protective Packaging –
Packaging techniques for COMSEC material that discourage penetration, reveal a penetration has occurred or was attempted, or inhibit viewing or copying of keying material prior to the time it is exposed for use.
Protective Technologies –
Special tamper-evident features and materials employed for the purpose of detecting tampering and deterring attempts to compromise, modify, penetrate, extract, or substitute information processing equipment and keying material.
Protocol –
Set of rules and formats, semantic and syntactic, permitting information systems to exchange information.
Protocol Data Unit –
A unit of data specified in a protocol and consisting of protocol information and, possibly, user data.
Protocol Entity –
Entity that follows a set of rules and formats (semantic and syntactic) that determines the communication behavior of other entities.
Proxy –
A proxy is an application that “breaks” the connection between client and server. The proxy accepts certain types of traffic entering or leaving a network and processes it and forwards it. This effectively closes the straight path between the internal and external networks making it more difficult for an attacker to obtain internal addresses and other details of the organization’s internal network. Proxy servers are available for common Internet services; for example, a Hyper Text Transfer Protocol (HTTP) proxy used for Web access, and a Simple Mail Transfer Protocol (SMTP) proxy used for email.
Proxy Agent –
A software application running on a firewall or on a dedicated proxy server that is capable of filtering a protocol and routing it between the interfaces of the device.
Proxy Server –
A server that services the requests of its clients by forwarding those requests to other servers.