Skip to Main Content
Idaho State University

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
P
P&D
P3P
PA
PAA
PAD
PAE
PAL
PAP
PAX
PBD
PBX
PC
PCA
PCS
PCZ
PD
Pdl
PDN
PDR
PDS
PDU
PES
PIP
PIX
PKA
PKC
PL
PLA
PM
PMD
PMO
PMP
Pod
POM
Pop
PPL
PPN
PPS
Ps
PSL
PSN
PTR
PTT
PUC
PUT
PVC
PWA
PX
Penetration Testing
  • The use of teams consisting of data processing, communications, and security specialists to attempt to penetrate a system for the purpose of identifying any security weaknesses. (AR 380-380;)
  • The use of special programmer analyst teams to attempt to penetrate a system for the purpose of identifying any security weaknesses. (FIPS PUB 39;)
  • The portion of security testing in which the evaluators attempt to circumvent the security features of a system. The evaluators may be assumed to use all system design and implementation documentation which may include listings of system source code, manuals, and circuit diagrams. The evaluators work under the same constraints applied to ordinary users. (NCSC-WA-001-85;; CSC-STD-001-83;)
  • The portion of security testing in which the evaluators attempt to circumvent the security features of a system. The evaluators may be assumed to use all system design and implementation documentation, that may include listings of system source code, manuals, and circuit diagrams. The evaluators work under the same constraints applied to ordinary users. (NCSC-TG-004-88)