Skip to content

Cybersecurity Glossary

84 terms covering IT security, OT security, compliance and industrial protocols.

P

PAM

Privileged Access Management - a set of practices and tools for controlling, monitoring and auditing elevated-privilege accounts within an organisation.

it security
PCI DSS

The Payment Card Industry Data Security Standard defining requirements for organisations that process, store or transmit cardholder data.

compliance
Penetration Testing

A controlled attack simulation against IT systems to discover vulnerabilities before a real attacker exploits them.

it security
Phishing

A social engineering technique involving impersonation of a trusted entity to steal credentials, personal data or trick the victim into performing a harmful action.

threats
PLC

Programmable Logic Controller - a device that controls industrial processes based on programmed logic and sensor inputs.

ot security
Polish Cybersecurity Act (UKSC)

The Polish Act on the National Cybersecurity System implementing the NIS Directive, regulating obligations of essential service operators and digital service providers.

compliance
Process Safety

An engineering discipline focused on preventing catastrophic failures in industrial installations by managing risks associated with hazardous materials and high-energy processes.

ot security
PROFINET

An open industrial communication standard based on Ethernet, providing real-time data exchange between controllers and field devices.

ot security
PTES

The Penetration Testing Execution Standard defining seven test phases - from reconnaissance to reporting - ensuring repeatability and comprehensiveness.

frameworks
Purdue Model

A hierarchical reference model describing the layers of network architecture in industrial environments - from field devices to business systems.

ot security

S

Sandbox

An isolated execution environment for safely running and analysing suspicious software without risk to production systems.

it security
SASE

A network architecture combining networking functions (SD-WAN) and security (CASB, SWG, ZTNA, FWaaS) in a single cloud-delivered platform.

it security
SCADA

A supervisory control and data acquisition system enabling remote monitoring and control of industrial processes in real time.

ot security
SIEM

A system for centrally collecting, correlating and analysing security logs from multiple sources to detect threats and support incident response.

it security
SIS - Safety Instrumented System

An independent automation system responsible for bringing a process to a safe state when a hazardous condition is detected.

ot security
SOAR

A platform combining security tool orchestration, incident response automation and case management in a single solution.

it security
SOC

Security Operations Centre - the team and infrastructure responsible for continuous monitoring, detection and response to security incidents.

it security
SOC 2

An auditing standard defining requirements for security, availability, processing integrity, confidentiality and privacy for service providers.

compliance
Spear Phishing

A targeted phishing attack aimed at a specific individual or organisation, using personalised information to increase message credibility.

threats
Supply Chain Attack

A cyber-attack targeting an organisation through compromise of its software vendor, service provider or component supplier - bypassing the target's direct defences.

threats

We'll discuss scope, methodology, and timeline.

+48 22 292 32 23 Talk to an expert