Glossary

All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
There are currently 15 names in this directory beginning with the letter P.
P
Pagejacking
If you click on a link and find yourself at an unexpected website, you may have been ‘pagejacked’. This happens when someone steals part of a real website and uses it in a fake site. If they use enough of the real site, Internet search engines can be tricked into listing the fake site and people will visit it accidentally. The fake site could contain unwanted or offensive material. As an online merchant trading via a website, you need to know that your site isn’t being stolen in this way. Unfortunately you can’t prevent pagejacking; you can only deal with it after you know it’s a problem. [ Type: Terminology ]
Passive honey pot
A method of acquiring spam for analysis, via planting of bogus email addresses which are rigged to forward emails to a specific mailbox. [ Type: Analysis ]
Password Spraying
It is an advanced brute-force technique that attempts to attack multiple user accounts with commonly used passwords. [ Type: Terminology ]
Patent
A patent is a set of exclusive rights granted by a sovereign state to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention. An invention is a solution to a specific technological problem and is a product or a process. Patents are a form of intellectual property. The procedure for granting patents, requirements placed on the patentee, and the extent of the exclusive rights vary widely between countries according to national laws and international agreements. Typically, however, a granted patent application must include one or more claims that define the invention. A patent may include many claims, each of which defines a specific property right. These claims must meet relevant patentability requirements, such as novelty and non-obviousness. The exclusive right granted to a patentee in most countries is the right to prevent others from commercially making, using, selling, importing, or distributing a patented invention without permission. [ Type: Terminology ]
Patent Citation
When referenced in a document, patents must be cited like books, journal articles, or any other resource. While its presentation varies according to individual style requirements, a citation for a patent should enable your reader to locate the patent and understand the basics (title, inventor, date, whether it is an application or a patent). The citation should enable readers to distinguish the patent in question from similar or related patents. [ Type: Terminology ]
Patent Portfolio management
A patent portfolio is the list of patents owned by an individual or a company. Managing your patent portfolio and comparing it to those of other companies is essential to helping you better determine the economic value of your own patents and remaining competitive. [ Type: Service Suite ]
Pay Per Click (PPC)
An internet advertising model used to direct traffic to websites, in which advertisers pay the publishers. [ Type: Attack ]
Pharming
DNS poisoning to redirect legitimate internet traffic of your websites to a fraudulent page. [ Type: Attack ]
Phish host
Phish Creator [ Type: Data ]
Phish tagging
Database with phish links. [ Type: Analysis ]
Phishing
Webpage impersonating the client with the objective of collecting their customers' information. [ Type: Attack ]
Phishing Kits
Phishing kits are kits provided by hackers for people with basic computer skills to launch phishing attacks. The kit includes several items which make launching a wide scale phishing attack easy such as spamming software, source code, and script to launch the attack. [ Type: Terminology ]
Polymorphic Virus
A polymorphic virus is a malicious program that modifies itself when it replicates. This technique enables it to evade detection by security software. [ Type: Terminology ]
Potentially Unwanted Program
PUP is a program that piggybacks software downloaded by the user. It is an unwanted program that downloads with the user's consent such as spyware, adware, or toolbars for browsers. [ Type: Terminology ]
Privilege Escalation
An attack in which the user will attempt to exploit bugs in the system allowing them to reach and use resources which should not be accessed by them. [ Type: Terminology ]