T Flashcards
TACACS+
Terminal Access Controller Access Control System Plus
This was initially used by Cisco as centralized
authentication for its routers and switches.
TAXII
Trusted Automated eXchange of Indicator Information
This defines four different services (discovery,
collection, inbox and polling) for the purpose of sharing
intelligence and threat information between
organizations.
TCP
Transmission Control Protocol
An upper layer protocol that requires handshakes,
acknowledgments and a graceful close.
TCPDump
Wireshark alternative
It is a command Linux based network analysis tool.
TGT
Ticket Granting Ticket
This is returned after a user successfully. Authenticates
to a KDC.
TKIP
Temporal Key Integrity Protocol
A protocol for key management and change used by
WPA.
TLS
Transport Layer Security
This is now incorporated into HTTPS and allows for
AES and other more recent cryptographic algorithms.
TOTP
Time-based One-time Password
A physical token-based authentication system with an
access code that changes regularly.
TPM
Trusted Platform Module
A cryptographic chipset that contains key information to
allow encryption and ensure device integrity.
Trojan
Trojan horse
This is a methodology of approaching a target by
disguising one thing or activity is something trustworthy
to achieve insertion.
TSIG
Transaction Signature
The component of the name resolution message that
performs authentication in DNSSEC.
TTP
Tactics, Techniques, and Procedures
A reference to the patterns of actions or methods that
can be associated with specific threat actors.