- Phases of BCP (Business Continuity Planning) Business Continuity Planning (BCP) involves several structured phases to ensure an organization can continue operations during and after a significant disruption. The key phases include Business Impact Analysis (BIA), which evaluates the potential effects of disruptions; Risk Assessment to identify threats and vulnerabilities; Strategy Development for maintaining critical functions; Plan Development, which documents the BCP; Training and Testing to prepare personnel and validate the plan; and maintenance to keep the BCP up to date.
- Phishing A type of cyber-attack that involves tricking individuals into revealing sensitive information, such as passwords or financial data, through fraudulent emails or websites. It is often used by hackers to gain access to accounts or steal personal information. 3 examples of phishing attacks are fake emails from banks asking for account information, fake online shopping websites requesting credit card details, and fake social media messages asking for login credentials.
- Phreakers Individuals who engage in the unauthorized access of telecommunication systems, such as telephone networks or voicemail systems. They may use special equipment or software to bypass security measures and gain access to restricted information or services. It is used in the field of information security to identify and prevent potential security breaches in telecommunications systems. 3 examples of phreaking activities are hacking into voicemail systems, making free long-distance calls, and accessing restricted phone numbers.
- Physical access control The measures put in place to restrict physical access to a facility, building, or device. This can include security guards, keycards, security cameras, and biometric scanners. It is used in the field of information security to prevent unauthorized individuals from gaining access to sensitive information or systems. 3 examples of physical access control measures are security guards at the entrance to a building, keycards for employees to access specific areas, and security cameras monitoring entrances and exits.
- Physical access token A physical access token is a tangible device that provides secure user authentication and access control to buildings, rooms, or information systems. These tokens store security credentials and can take various forms, such as key fobs, smart cards, or USB tokens. Examples include RFID badges for building access, tokens for two-factor authentication, and smart cards used in conjunction with personal identification numbers (PINs).
- Physical addressing The process of assigning a unique identifier to each device on a network, such as a MAC address or IP address. This allows devices to communicate with each other by sending and receiving data over the network. Physical addressing is used to identify and locate devices on a network and to enable communication between them. For example, a computer may use its physical address to send a request for data to a server, and the server will use its physical address to respond to the requested data.
- Physical controls Security measures that are implemented in the physical environment to protect against unauthorized access to sensitive information. These measures may include locks, barriers, alarms, and surveillance cameras. Physical controls are used to prevent unauthorized individuals from entering a secure area or to detect and deter potential security threats. For example, a building may have locked doors and security cameras to prevent unauthorized access, or a computer may have a password-protected login screen to prevent unauthorized access to its data.
- Physical Layer The lowest layer of the OSI model, which defines the physical characteristics of a network, such as the transmission media, connectors, and signaling methods. It is used in the field of information technology to ensure the reliable and efficient transmission of data across a network. 3 examples of physical layer components are network cables, network switches, and network adapters.
- Piggyback attack A type of cyber-attack that occurs when an unauthorized person or entity gains access to a secure network or system by piggybacking on the credentials of an authorized user. It is often used to bypass security measures and gain access to sensitive data or resources. Examples include an attacker using someone's login credentials to gain access to a company's network, an employee sharing their credentials with a third party, or the attacker following someone else into a building bypassing the card swipe or door lock.
- Piggybacking The practice of gaining unauthorized access to a restricted area by following someone who has legitimate access. It is often used by individuals who do not have the proper credentials to enter a building or facility but can gain access by following someone who does. It is used in the field of information security to identify and prevent potential security breaches by unauthorized individuals. 3 examples of piggybacking are an individual following an employee into a secure office building, a visitor following a resident into a gated community, and a customer following an employee into a restricted area of a store.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.