Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
T
T<0, 1, …, r-1>
T(x, k)
T1 Line
T3 Line
TA
Tabletop Exercise
TACACS
TACACS+
Tactical Data
Tactical Edge
Tag
Tag Identifier
Tag Talks First
Tag-Length-Value
Tailored Security Control Baseline
Tailoring
Tailoring (Assessment Procedures)
Tamper Detection
Tamper Evidence
Tamper Response
Tampering
Target Data
Target Identification And Analysis Techniques
Target Of Evaluation
Target Of Evaluation Security Functions
Target Of Evaluation Security Policy
Target Security Strength
Target Server
Target Vulnerability Validation Techniques
TAS
TB
TbitLen(X)
TC
TCB
TCG
TCK
TCP
TCP/IP
TCP/UDP
TCSEC
TD
TDEA
TDEA Electronic Codebook
TDES
TDM
TDMA
TECB
Technical Committee
Technical Community
Technical Control
Technical Controls
Technical Countermeasures
Technical Implementation Guidance
Technical Non- Repudiation
Technical Reference Model
Technical Review Board
Technical Safeguards
Technical Security Controls
Technical Security Material
Technical Services
Technical Surveillance Countermeasures
Technical Vulnerability Information
Technology Development
TEK
Telecommunications
Telecommunications Security Nomenclature
Telecommuting
Telework
Telework Client Device
Telework Device
Temperature Sensor
TEMPEST
TEMPEST certified equipment or system
TEMPEST zone
Template
Template Generator
Template Matcher
Temporal Key
Temporal Key Integrity Protocol
Temporary Key
Tentative Address
TEP
Terabytes
TERENA
Terminal Access Controller Access Control System
Terminal Access Controller Access Control System + (protocol)
Test
Test Assertion
Test Director
Test Guide
Test Key
Test Plan
Test Results Summary
Test Run Detail
Test, Training, And Exercise
Test, Training, and Exercise (TT&E) Plan
Test, Training, and Exercise (TT&E) Policy
Test, Training, and Exercise (TT&E) Program
Test, Training, and Exercise (TT&E) Program Coordinator
Test, Training, And Exercise Event
Testability
Text
TFS
TFTP
TGS
THC
The Alert Protocol
The American National Standards Instituteansi Accredited Standards Committee.
The Biometrics Standardization Subcommittee Under Iso/Iec Joint Technical Committee
The Change Cipher Spec Protocol
The Clinger-Cohen Act Of 1996
The Federal Information Security Management Act
The Hacker’S Choice
The Internet Engineering Task Force
The Technical Reference Model
The Ultimate Collection Of Forensic Software
Third Extended Filesystem
Third-Party Testing
Thread
Threat
Threat Agent
Threat Agent/Source
Threat Analysis
Threat Assessment
Threat Assessment/Analysis
Threat Campaign
Threat Event
Threat Information
Threat Monitoring
Threat Scenario
Threat Shifting
Threat Source
Three key TDEA
Three-Key Triple Data Encryption Algorithm
Threshold
TIC
Ticket Granting Service
Ticket-Granting Service
TID
Tier 0
Tier 0Central Facilitycomsec (central facility; COMSEC)
Tier 1/Common Tier 1 (COMSEC)
Tier 2 (COMSEC)
Tier 3 (COMSEC)
TIG
TIK
Time Bomb
Time Division Multiple Access
Time Division Multiplexing
Time To Live
Time-Compliance Date
Time-Dependent Password
Timestamp
Timestamp Packet
Timestamp Token
Timestamp_Packet
timestamp_signatureTTA
timestamp_time
timestamped_data
TK
TKEY
TKIP
TKIP Sequence Counter
TLD
TLS
TLS handshake protocol
TLV
TMacTagBits(X)
TMSAD
TOE
TOE Security Functions
TOE Security Policy
Token
Token Authenticator
Token Secret
Top Level Domain
Top-Level Domain
Top-of-Rack
ToR
TOS
Total Risk
TPC
TPDU
TPI
TPM
Traceable
Tradecraft Identity
Traditional Key
Traffic Analysis (WLAN attack)
Traffic Analysis ((PBX))
Traffic Analysis
Traffic Class (IPv6 Field)
Traffic Encryption Key
traffic flow analysis
Traffic Flow Confidentiality
Traffic Flow Security
Traffic Padding
Training
Training
Training Assessment
Training Effectiveness
Training Effectiveness Evaluation
Training Key
Training Matrix
Tranquility
Transaction Key
Transaction Signature
TRANSEC
Trans-European Research And Education Networking Association
Transfer Cross Domain Solution
Transfer Key Encryption Key
Transfer Of Accountability
Transient Cipher Key
Transient EAP Key
Transient Encryption Key
Transient Integrity (protection) Key
Transition Security Network
Transmission
Transmission Control Protocol
Transmission Control Protocol/Internet Protocol
Transmission Control Protocol/User Datagram Protocol
Transmission Security
Transmitter Address
Transparency
Transponder
Transport Layer
Transport Layer Security
Transport Layer Security Protocol
Transport Mode
Transport Protocol Data Unit
Transport Relay Translator
Transportation Security Administration
TransportedKeyingMaterial
Trap Door
TRB
TRD
Treasury Agency Symbol
Triangulation
Trigger (insider threat)
Trigger
Triggering Event
Triple Data Encryption Algorithm
Triple Data Encryption Standard
Triple DEA
Triple DES
Trivial File Transfer Protocol
TrKEK
TRM
Trojan Horse
TRS
TRT
Truncs (X)
Trust
Trust Anchor
Trust Anchor Store
Trust List
Trust Model For Security Automation Data
Trust Relationships
Trusted Agent
Trusted Association
Trusted Certificate
Trusted Channel
Trusted Computer System
Trusted Computer System Evaluation Criteria
Trusted Computing Base
Trusted Computing Group
Trusted Foundry
Trusted Internet Connection
Trusted Operating System
Trusted Operating System (secure)
Trusted Party
Trusted Path
Trusted Platform Module
Trusted Platform Module Chip
Trusted Process
Trusted Recovery
Trusted Third Party
Trusted Timestamp
Trusted Timestamp Authority
Trustworthiness
Trustworthiness (Information System)
Trustworthy System
TS
TSA
TSC
TSCM
TSEC
TSEC nomenclature
TSF
TSIG
TSIG Key
TSN
TSP
TST
TT&E
TT&E Plan
TT&E Policy
TT&E Program
TT&E Program Coordinator
TTA
TTA_supplied_info
TTF
TTL
TTLS
TTP
TUCOFS
Tuning
Tunnel Endpoint
Tunnel Key
Tunnel Mode
Tunnel Protocol
Tunnel Setup Protocol
Tunnel Vpn
Tunnel-Based Eap Method
Tunneled Authentication Method
Tunneled Transport Layer Security
Tunneling
Two-Key Triple Data Encryption Algorithm
Two-Person Control
Two-Person Integrity
TXT
Type Accreditation (C.F.D.)
Type Authorization
Type Certification
Type Of Service