vocabularyT Flashcards
TACACS
Terminal Access Controller Access Control System is a centralized authentication type that provides single factor authentication and authorization for direct access. The TACACS+ version implements two-factor authentication.
Tailor Training
A method of training that matches the level of scope of the security training to the organizations security requirements.
TCB
Trusted Computing Base is a collection of hardware, software, and controls that work together to enforce the security policy.
TCP/IP
Transmission Control Protocol/Internet Protocol is a set of communication protocols developed by the U.S. Department of Defense that enables dissimilar computers to share information over a network.
TCSEC
Trusted Computer System Evaluation Criteria is a book commonly referred to as the Orange Book, that was put together by the US Department of Defense in 1985 to specify categories that can be used to rate the functionality and assurance of a system.
Technical Control
Pieces of software or hardware that help to secure an organizations assets.
Terrorist Attack
A type of attack that attempts to alter the normal lifestyle of a group of people, generally in order to make a point. This type of attack generally targets infrastructure machines or other high-visibility entities.
Threat
Any weakness that may include natural disasters, physical factors, or threats engineered by people.
Ticket
A multiple component message that is sent back and forth in Kerberos. The message contains the ticket and an authentication message specifying that the subject is authenticated or that a subject has been authenticated and is valid to access a specific object.
TOC/TOU
Time of check/time of use is an attack that exploits timing vulnerabilities by modifying the object between the time of check, which verifies permissions and attributes, and the time of use, which is when the object is actually used.
Token Device
A small device that generates passwords based on synchronous or asynchronous query to a centralized server. An example would be a smart card.
Token Ring
A network technology developed by IBM that has become the industry standard. The logical topology is always a ring and physical topology will generally be a star.
Top Secret
Information that is an elevated security label and ensures the information can only be viewed by the top information gathers or users. Must have top secret clearance and must need to know the information.
Trade Secret
Any intellectual property critical to a business that is not divulged to outside parties.
Trademark
A word, collection of words, slogan, or logo that identifies an organization or product. A registered trademark lasts for ten years and is renewable.