Skip to Main Content
Idaho State University home

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
P
P&D
P3P
PA
PAA
PAD
PAE
PAL
PAP
PAX
PBD
PBX
PC
PCA
PCS
PCZ
PD
Pdl
PDN
PDR
PDS
PDU
PES
PIP
PIX
PKA
PKC
PL
PLA
PM
PMD
PMO
PMP
Pod
POM
Pop
PPL
PPN
PPS
Ps
PSL
PSN
PTR
PTT
PUC
PUT
PVC
PWA
PX
Penetration
  • The successful unauthorized access to an automated system. (AR 380-380;; FIPS PUB 39;)
  • The successful act of bypassing the security mechanisms of a system. (NCSC-WA-001-85;)
  • The successful and repeatable extraction and identification of recognizable information from a protected data file or data set without any attendant arrests. (OPNAVINST 5239. 1; DODD 5200. 28M;)
  • The act of overcoming one or more measures designed to protect an organization's operation, activity, facilities, information, or personnel. *The recruitment of agents within or the infiltration of agents or introduction of technical monitoring devices into an organization or group or physical facility for the purpose of acquiring information or influencing its activities. (IC Staff, Glossary of Intelligence Terms and Definitions, 6/89)
  • The successful act of bypassing the security mechanisms of a cryptographic or automated information system. (NSA, National INFOSEC Glossary, 10/88)