Proximity Reader

Proximity Reader: A device that uses electromagnetic fields or radio waves to identify objects in close proximity. This is commonly used in security systems to authenticate users based on their proximity to a particular device or location. Examples include RFID readers and NFC readers.

Public key certificate

Public key certificate: A digital certificate that verifies the identity of the certificate holder using a public key. It is part of a public key infrastructure, essential for establishing secure communications over the internet.

Private Key

Private Key: A cryptographic key used in asymmetric cryptography that is kept secret and is essential for decrypting data encrypted with a corresponding public key. Private keys are integral to secure communications and authentication protocols like SSL/TLS and SSH.

Privilege escalation

Privilege escalation: The act of exploiting a vulnerability or misconfiguration to gain access to privileges and permissions beyond the intended level of access. It is used in the context of security vulnerabilities and threats to gain unauthorized access to sensitive data and systems. Examples include exploiting weak passwords, privilege mismanagement, and insecure default configurations.

Privilege

Privilege: A special right, immunity, or exemption granted to an individual or group. It is used in the context of access control to grant certain users or processes additional rights and permissions beyond the default access level. Examples include administrative privileges, root privileges, and privileged accounts.

Privileged Users/Accounts

Privileged Users/Accounts: A user or account with additional rights and permissions beyond the default access level. It is used in access control systems to grant certain individuals or processes access to sensitive data and systems. Examples include administrator accounts, root accounts, and service accounts.