Glossary T-U-V-W-X-Z Flashcards
TACACS+ (Terminal Access Controller Access Control System Plus)
An AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management.
tail command
Linux utility for showing the last lines in a file.
tailgating
Social engineering technique to gain access to a building by following someone who is unaware of their presence.
TAP (test access port)
A hardware device inserted into a cable to copy frames for analysis.
tape
Tape media provides robust, high-speed, high-capacity backup storage. Tape drives and autoloader libraries can be connected to the SATA and SAS buses or accessed via a SAN.
TAXII (Trusted Automated eXchange of Indicator Information)
A protocol for supplying codified information to automate incident detection and analysis.
tcpdump command
A command-line packet sniffing utility
tcpreplay command
A command-line utility that replays packets saved to a file back through a network adapter.
technical control
A category of security control that is implemented as a system (hardware, software, or firmware). Technical controls may also be described as logical controls.
tethering
Using the cellular data plan of a mobile device to provide Internet access to a laptop or PC. The PC can be tethered to the mobile by USB, Bluetooth, or Wi-Fi (a mobile hotspot). Also known as hotspot.
theHarvester
Utility for gathering results from open source intelligence queries
thin AP
An access point that requires a wireless controller in order to function.
third-party risks
Vulnerabilities that arise from dependencies in business relationships with suppliers and customers.
threat actor
The person or entity responsible for an event that has been identified as a security incident or as a risk.
threat hunting
Cybersecurity technique designed to detect presence of threats that have not been discovered by normal security monitoring.
threat map
Animated map showing threat sources in near real-time.
time of day restrictions
Policies or configuration settings that limit a user’s access to resources.
time offset
In forensics, identifying whether a time zone offset has been applied to a file’s time stamp.
timeline
In digital forensics, a tool that shows the sequence of file system events within a source image in a graphical format.
TKIP (Temporal Key Integrity Protocol)
A mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.
TLS (Transport Layer Security)
A security protocol that uses certificates for authentication and encryption to protect web communication.
TOCTTOU (time of check to time of use)
The potential vulnerability that occurs when there is a change between when an app checked a resource and when the app used the resource.
token
A physical or virtual item that contains authentication and/or authorization data, commonly used in multifactor authentication.
tokenization
A deidentification method where a unique token is substituted for real data.
TOTP (Time-based One-time Password)
An improvement on HOTP that forces one-time passwords to expire after a short period of time.
TPM (Trusted Platform Module)
A specification for hardware-based storage of digital certificates, keys, hashed passwords, and other user and platform identification information.transit gateway In cloud computing, a virtual router deployed to facilitate connections between VPC subnets and VPN gateways.
trend analysis
The process of detecting patterns within a dataset over time, and using those patterns to make predictions about future events or better understand past events.