Skip to Main Content
Apply
Quicklinks
Search
A-Z Index
BengalWeb
Campus Map
Directory
Email
Events
Library
Moodle
News
Give
Admissions
Students
Faculty & Staff
Parents
Alumni & Visitors
Academic Calendar
Academic Catalogs
Administration
Advising
Athletics
Campus Security
Career Center
Class Schedule
Colleges & Departments
Financial Aid
Health & Wellness
Housing
Human Resources
Jobs
Museum of Natural History
Parking
Registrar
Scholarships
Transcripts
Tuition
Majors
Cost
Visit
Parking
Map
Apply
Give
Search
Common Searches
BengalWeb
Bookstore
Academic Calendar
Directory
COVID-19
Jobs
Human Resources
Moodle
Calendar
Tuition
JavaScriptMessages
Security Site
Security At ISU
News
Rss Feeds
Security Home
SiteMap
About
Competencies & Certifications
Contact
Industry Advisory Board
Opportunities
Capacity Building
Student Opportunities
Projects & Accomplishments
Student Resources
Curriculum
Curricula
Course Modules
Module 1
Ethics 1
Problems 1
Resource 1
Studies 1
Support 1
Module 2
Data Security
Environment
Ethics 2
Physical
Security Training
Support 2
Module 3
Audit
Costs & Benefits
Ethics 3
Personnel
Physical
Planning
Policy
Recovery
Support 3
System
Threats
Module 4
Module 5
Module 6
Module 7
Module 8
Idaho State University Cybersecurity Curriculum
Resources & Activities
Scholarship
Benefits
Criteria
Application
FAQ
Process
Academics
Philosophy
Professionalism
Academic Program
Admission to COB
COB Graduation Requirements
Course Descriptions
Graduate
INFO Major
IRI/SFS Program of Study
Supporting Courses
Critical Infrastructure Security
ESET 0281
ESET 0282
ESET 0283
ESET 0284
ESET 0285
ESET 0286
Smart Grid
ESET 0253
ESET 0254
ESET 0255
ESET 0256A
ESET 0257
ESET 0258
ESET 0259
Lower Division
ACCT 2201
2201 Syllabus
ACCT 2202
2202 Syllabus
ACCT 3323
ACCT 3324
Lower Division CS
CS 1187
CS 2275
CS 2282
INFO 1100
INFO 1101
INFO 1110
INFO 1120
INFO 1181/CS 1181
INFO 1182/CS 1182
INFO 2285
MGT 2261
Upper Division
Upper Division CS
CS 3385
CS 4487
EE 4427/4427L
INFO 3301
INFO 3307
INFO 3310
INFO 3380
INFO 3393
INFO 4407
INFO 4411
INFO 4412
4012 Competencies
INFO 4012 Mapping
Syllabus 4412
INFO 4413
4013 Mapping
Syllabus 4413
INFO 4414
4014 Mapping
Syllabus 4414
INFO 4415
4015 Competencies
4015 Mapping
INFO 4416
4416 Competencies
4016 Mapping
INFO 4417
INFO 4419
INFO 4420
INFO 4422
INFO 4424
INFO 4430
INFO 4432
INFO 4482
INFO 4485
INFO 4486
INFO 4487
INFO 4488
INFO 4491
INFO 4492
INFO 4493
INFO 4499
Law and Ethics
Graduate
INFO 5312
INFO 5313
INFO 5314
INFO 5511
INFO 5512/6612
CNSS 4012 Mapping
Competencies
INFO 6612
Syllabus 5512
INFO 5513
CNSS 4013 Mapping
Competencies
INFO 6613
Syllabus 5513
INFO 5514
CNSS 4014 Mapping
Competencies
INFO 6614
Syllabus 5514
INFO 5515
CNSS 4015 Mapping
Competencies
INFO 5516
CNSS 4016 Mapping
Competencies
INFO 5517
INFO 5519
INFO 5520
INFO 5522
INFO 5524
INFO 5526
INFO 5530
INFO 5531
INFO 5532
INFO 5540
INFO 5582
INFO 5584
INFO 5586
INFO 5587
INFO 6610
INFO 6620
INFO 6630
INFO 6640
INFO 6650
INFO 6660
INFO 6670
INFO 6699
MBA 6624
MBA 6625
MBA 6639
Reference page for CNSS
Cybersecurity Outreach
Government
Industry Professionals
Law Enforcement
Older Americans
Parents and Educators
Small Business
Students
Women's Outreach
Young Professionals
Ethics
ACM Ethics
IAP Behavior
IEEE Ethics
ISACA Ethics
ISSA Ethics
ISTE Ethics
"Non-IA" Courses
Courses w/ Projects
Schou Vita
Faculty
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
P
P Model
P&D
P. O. D.
P3P
PA
PAA
PABX
Packet
Packet Assembler/disassembler
Packet Filtering
Packet Format
Packet inspection
Packet Switched Networks
Packet Switching
Packet Transfer Mode
Packet-Mode Terminal
Packet-Switched Data Transmission Service
Packet-Switching Network
PAD
Padded Cell
PAE
Page In
Page Out
Pain In The Net
Paired Disparity Code
PAL
Palladium
PAP
Paper-Net
Paperwork Reduction Act
Parallel Computer
Parallel Information Unit
Parallel Processing
Parallel Transmission
Parallel-To-Serial Converter
Param
Parameters
PARC
Parent Message
Parity
Parity Check
Parity Errors
Parkinson's Law Of Data
Parm
Parse
Partial Ordering
Partitioned Security Code
Partitioned Security Mode
Pascal
Pass
Pass Key
Pass phrase
Passive Attack
Passive fingerprinting
Passive Station
Passive Threat
Passive Wiretapping
Passphrase
Passport
Passwd
Password
Password Authentication Protocol (PAP)
Password Dialogue
Password Length Equation
Password Length Parameter
Password Management
Password Management Guideline
Password reset
Password Space
Password System
Password-cracking software
Pastie
PAT (Port address translation)
Patch
Patch Space
Patch test system
Path
Pathological
Patriot Act of 2001
Patterns
PAX
Payload
Payware
PBD
PBX
PC
PCA
PC-Ism
PCS
PCZ
PD
Pdl
PDN
PDP-10
PDP-20
PDR
PDS
PDU
Peek
Peer-Entity Authentication
Peer-To-Peer Security
Pen registers
Pencil And Paper
Penetration
Penetration Paths
Penetration Profile
Penetration Signature
Penetration Study
Penetration Testing
Peon
PERC
Per-Call Key
Perceived Threat
Percent of disruption
Percent-S
Perf
Perfect Programmer Syndrome
Performance
Performance Parameter
Peril
Periods Processing
Peripheral Device
Peripheral Devices
Peripheral Equipment
Perl
Permissions
Permit All
Permuter
Perpetrator
Person Of No Account
Personal Data
Personal Identification Number
Personal Identification Number (PIN)
Personal Identifier
Personal IDS
Personal Password
Personnel
Personnel Screening
Personnel Security
Personnel Security Policies And Guidance
PES
Pessimal
Pessimizing Compiler
Peta
PETSCII
PGP (Pretty Good Privacy)
Phage
Phase
Phase Of The Moon
Phase-Locked Loop
Phase-Wrapping
Phonetic Alphabet
Photosensitive Recording
Phracker
Phreak
Phreaker
Phreaking
Physical Compromise
Physical Control Space
Physical Control Space/physically Controlled Space (PCs)
Physical Layer
Physical link
Physical Memory Location Of The Instruction
Physical Seals
Physical Security
Pico
PID (Process ID)
Pig, Run Like A
Piggy Back
Piggy Back Entry
Piggyback
Piggybacking
Pilot Error
PIN (Personal Identification Number)
Ping
Ping (Packet INternet Groper)
Ping scanning
Ping-of-Death
Pink-Shirt Book
PIP
Piracy
Pistol
PIX
Pixel Sort
Pizza Box
Pizza, ANSI Standard
PKA
PKC
PKI (Public key infrastructure)
PKSD
PL
PL/1
PLA
Plaid Screen
Plain Text
Plain Text/plain-Text
Plain-ASCII
Plaintext
Plan File
Planning
Plan-protect-respond (PPR)
Platform for Privacy Preferences (P3P)
Platform-Specific Security
Platinum-Iridium
Playpen
Playte
Plingnet
Plokta
Plonk
Plotter
PLSDU
Plugh
Plumbing
PM
P-Mail
PMD
PMO
PMP
Pnambic
PNEK
PNET
Pod
Point Of Presence
Point-And-Drool Interface
Pointer Bug
Point-to-Point Protocol (PPP)
Point-to-Point Tunneling Protocol (PPTP)
Poisson Function
Poke
Policies
Policy
Policy Development
Policy Enforcement
Policy-based audits
Poll
Polygon Pusher
Polygraphic Processing
POM
Pop
POP (Post Office Protocol)
Pop-behind ads
POPJ
Port address translation (PAT)
Port numbers
Port scanning
Port spoofing
Port-switching application
Poser
Position Sensitivity
Positive Control
Positive Control Material
Post
Post Office Protocol (POP)
Postcardware
Posting
Postmaster
Postmortem analysis
PostScript
Post-Selection
Potential Threat
Pound On
Power Controls (e. G. , UPS, Emergency Power)
Power Cycle
Power Hit
Power Line Conduction
Power Line Modulation
Power users
Powerline Conduction
PPL
PPN
PPP (Point-to-Point Protocol)
PPS
PPTP (Point-to-Point Tunneling Protocol)
PPTP access concentrator
Practice Dangerous To Security
Practices
PRBAC
Precedence Lossage
Precision
Predicated Event
Preferred Products List (PPL)
Preliminary Technical Report
Prepend
Preproduction Model
Pre-Selection
Preserving evidence
President's Council On Integrity And Efficiency
Prestidigitization
Pretty Good Privacy (PGP)
Pretty Pictures
Prettyprint
Pretzel Key
Preventative Controls
Prevention
Preventive Maintenance
Price
Priesthood
Primary Distribution
Primary RED Conductor
Primary Station
Primary Substation
Prime authentication problem
Prime Time
Primitive
Principle of least permissions
Principle Of Least Privilege
Principles Of Control
Print Suppression
Print Suppression/print Suppress
Printing Discussion
Priority Interrupt
Priority Message
Privacy
Privacy Act
Privacy Act Guidelines
Privacy Act Of 1974
Privacy disclosure statements
Privacy Protection
Privacy System
Privacy Transformation
Private Automatic Branch Exchange
Private Automatic Exchange
Private Branch Exchange
Private Branch Exchange Security
Private Communication
Private Exchange
Private IP addresses
Private key
Private Key Cryptology
Private Line
Private network
Private Networks
Private port numbers
Privilege
Privilege Levels
Privilege Profile
Privileged Data
Privileged Instructions
Privileged Process
Privileges (Class, Nodes)
Privity
Probable cause
Probes
Procedural Security
Procedure-Oriented Language
Procedures
Process
Process Computer System
Process Control
Process Control Equipment
Process Control System
Process ID (PID)
Process Interface System
Process Isolation
Process Manager
Process Signaling
Processing
Processing performance
Processing Unit
Processor
Procurement
Procurement Lead Time
Product Questionnaire
Production Model
Production server
Professional Interfaces
Profile
Profiles
Proglet
Program
Program Origin
Programmable
Programmable Logic Array
Programmable Read-Only Memory
Programmer
Programmer's Cheer
Programming
Programming Fluid
Programming Language
Programming System
PROM
Promiscuous mode
Propaganda
Propagation
Propagation Of Risk
Propagation vector
Propeller Head
Propeller Key
Property
Property Protection Area
Property Star Property
PROPIN
Proprietary
Proprietary Data
Proprietary Information
PROSECUTION
Protect As Restricted Data
Protected
Protected Communications
Protected Distributed System
Protected Distribution System (PDS)
Protected Information
Protected Services
Protected Wireline Distribution System
Protection
Protection Bits
Protection Critical
Protection Equipment
Protection From Malicious Code
Protection Index
Protection Mechanisms
Protection Philosophy
Protection Ring
Protection-Critical Portions Of The TCB
Protection-Critical Portions Of Trusted Computing Base
Protective
Protective Features
Protective Measures
Protective Mechanism
Protective Packaging
Protective Technologies
Protective Technology
Protective Technology/Package Incident
Protocol
Protocol Data Unit
Protocol enforcement
Protocol field
Protocol stack monitors
Protocols
Prototype
Provably Secure Operating System
Provisioning
Provocative Maintenance
Prowler
Proxy
Proxy firewall
Ps
PSDU
Pseudo
Pseudo-Flaw
Pseudoprime
Pseudorandom Noise
Pseudorandom Number Sequence
Pseudosuit
PSL
PSN
PSOS
PSTN
Psychedelicware
Psyton
PTR
PTT
Public Cryptography
Public Data Network
Public Data Transmission Service
Public Domain
Public Domain Software
Public Key
Public Key Cryptography (PKC)
Public Key Encryption
Public key infrastructure (PKI)
Public Law 100-235
Public Policy
Public Switched Network (PSN)
Public Switched NS/EP Telecommunications Services
Public Switched Telephone Network
Public Utility Commission
PUC
Puff
Punched Card
Punt
Purge
Purging
Purging Magnetic Media
Purple Book
Purple Wire
Purpose And Scope
Push
PUT
PVC
PWA
PWDS
PX
Protection Index
A measure of perceived risk determined from the combination of the clearance level of users and the classification of the data on the classified ADP system. The determination of this index is described on page 111-14, paragraph 5. (DOE 5637. 1)