JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
T
T&E
TA
TACTED
TACTERM
Tactical Communication System
TAG
Tail Recursion
Tailing
TAISS
Talk Mode
Talker System
Tamper-Indicative Seal
Tampering
Tanked
TANSTAAFL
Tap
Tape Mixer
Tapes
Tar
Tar And Feather
Target
Targeted attacks
Target-of-opportunity attacks
Tasking
TASO
Taste
Tayste
TCB
TCB Subset
TCD
TCP (Transmission Control Protocol)
TCP port scanning
TCP segment
TCP/IP standards
TCP/IP-OSI architecture
TCS
TCSEC
TCSEC/ITSEC/Common Criteria
TCU
TD
TD:D1
TD:D2
TDBI
TDM
TDMA
Tea, ISO Standard Cup Of
Teardrop
Technical Attack
Technical Data
Technical Document
Technical Information
Technical Penetration
Technical Point Of Contact
Technical Rationale Behind Csc-Std-003-85: Computer Security Requirements
Technical Review
Technical Review Board
Technical Security
Technical Security Guidance
Technical Security Hazard
Technical Security Material
Technical Surveillance Countermeasures
Technical Vulnerability
Technological Attack
Technological Threats
Technology
Technology Trade-Offs
Technology Trends
Techspeak. Square Tape
TECO
TED
Tee
TEI
TEK
Telecommunication
Telecommunication Architecture
Telecommunication Facilities
Telecommunication Service
Telecommunication System
Telecommunication System Operator
Telecommunications
Telecommunications And Automated Information Systems Security
Telecommunications closet
Telecommunications Security
Telecommunications System
Teleconference
Telegram
Telegraph
Telegraphy
Telemetry
Telemetry Intelligence
Telephone Exchange
Telephony
Teleprinter
Teleprocessing
Teleprocessing Security
Telerat
Teleservice
Teletex
Teletext
Teletypewriter (TTY)
Teletypewriter Control Unit
Teletypewriter Exchange Service
Television
TELINT
TELNET
TEMP
TEMPEST
TEMPEST Channel
TEMPEST Encoding
TEMPEST Test
TEMPEST Zone
Template
Temporal Key Integrity Protocol (TKIP)
Tense
Tentacle
Tenured Graduate Student
TEP
Tera
Teraflop Club
Terminak
Terminal
Terminal Adapter
Terminal Area Security Officer
Terminal Brain Death
Terminal ID
Terminal Identification
Terminal Illness
Terminal Junkie
Terminals
Terminology
Terpri
Terrorism
Test
Test And Validation
Test Condition
Test Data
Test Detection System
Test Documentation
Test Key
Test Message
Test Plan
Test Point
Test Procedure
Test Program
TEST:D1
TEST:D2
Testing server
TeX:
Text
Text Editor
TFM
TFM:D1
TFM:D2
TFS
TFTP (Trivial File Transfer Protocol)
TGT (ticket granting ticket)
Theft
Theft Of Data
Theology
Theory
Thinko
Third-Party Evaluation
Thrash
Thread
Threat
Threat Agent
Threat Analysis
Threat Assessment
Threat enumeration
Threat Event
Threat Monitoring
Threat Realization Cost
Threat severity
Threat Viability Threshold
Threat, Postulated
Three-Bit Byte
Three-Finger Salute
Three-way open
Threshold
Throughput
Thumb
Thunk
Tick
Ticket granting ticket (TGT)
Ticket-Granting Service
Ticket-Oriented
Tickle A Bug
Tick-List Features
Tiger Team
Time
Time Bomb
Time Bomb/time-Bomb
Time Compliance Date
Time exceeded
Time Marker
Time Of Occurrence
Time Sink
Time Slot
Time stamp
Time Standard
Time T
Time Tick
Time-Bomb
Time-Dependent Password
Time-Division Multiple Access
Time-Division Multiplexing
Time-Division Switching
Time-Out
Time-Sharing
Times-Or-Divided-By
Time-to-live (TTL)
Tinkerbell Program
TIOCC
Tip Of The Ice-Cube
Tired Iron
Title 18
TitleĀ 47
Tits On A Keyboard
TKIP (Temporal Key Integrity Protocol)
TLA
TLS
TLS (Transport Layer Security)
TMC
TMRC
TMRCie
TNI
TNIEG
Toad
Toast
Toaster
Toeprint
Toggle
Token
Token Passing
Token-Bus Network
Token-Ring Network
Tolerance
Tool
Toolsmith
Topic Drift
Topic Group
Top-Level Specification
Topology
TOPS-10:
TOPS-20:
Torn-Tape Relay
Total length
Touch-Sensitive
Tourist
Tourist Information
Touristic
Toy
Toy Language
Toy Problem
Toy Program
TPC
TPI
TPOC
TPWG
Trace Packet
Trace Program
Traceroute
Tracert
Track
Track Density
Tracking Error
Tracking Mode
Tracking Phase
Trade Secret
Trade secrets
Traditional COMSEC Program
Traffic
Traffic Analysis
Traffic Capacity
Traffic Encryption Key
Traffic F Low Security
Traffic Flow Confidentiality
Traffic Flow Information
Traffic Flow Security
Traffic Padding
Traffic-Flow Security
Trailer
Training
Training Key
Trampoline
Tranquility
Tranquillity
Transceiver
Transducer
TRANSEC
Transfer
Transfer Characteristics
Transfer Function
Transfer Mode
Transfer Rate
Translating Program
Translation table
Translator
Transliterate
Transmission
Transmission Block
Transmission Control Protocol (TCP)
Transmission Frame
Transmission Security
Transmission Security Key
Transparent Interface
Transparent protection
Transponder
Transport Layer
Transport Layer Security (TLS)
Transport mode
Transportability
Transportable Station
Transportation Of Media
Transposition
Trap
Trap and trace
Trap Door
Trash
Trawl
TRB
Tree Search
Tree Structure
Tree Topology
Tree-Killer
Treeware
Tri-homed
Triple DES (3DES)
Triplet
Tripwire
Trit
TRI-TAC
TRI-TAC Equipment
Trivial
Trivial File Transfer Protocol (TFTP)
Troff:
Troglodyte
Troglodyte Mode
Trojan Horse
Trojan horse backdoor program
Troll
Tron
TRR
True party
True-Hacker
Truncation
Truncation Error
Trunk
Trunk Encryption Device (TED)
Trunk Group
Trust
Trusted Computer System
Trusted Computer System Evaluation Criteria
Trusted Computer System Evaluation Criteria (Orange Book)
Trusted Computing Base
Trusted Courier
Trusted Database Interpretation
Trusted Database Management System Interpretation Of The Tcsec
Trusted Distribution
Trusted Element
Trusted Facility Management
Trusted Facility Manual
Trusted Functionality
Trusted Identification Forwarding
Trusted Network
Trusted Network Interface
Trusted Network Interpreation
Trusted Network Interpretation (Red Book)
Trusted Network Interpretation Environments Guideline
Trusted Path
Trusted Process
Trusted Product Evaluation Program
Trusted Product Evaluation Questionnaire
Trusted Product Evaluations
Trusted Products
Trusted Software
Trusted Subject
Trusted System
Trusted Unix Working Group
Trusted Users
Trustworthy Element
Truth Table
TSCM
TSEC
TSEC Nomenclature
TSK
TTBT
TTL (time-to-live)
TTLS
Tty
TTY/TDD
Tube
Tube Time
Tunable
Tunafish
Tune
Tuning
Tunnel mode
Tunneled TLS (TTLS)
Tunneling
Turbo Nerd
Turing Machine
Turing Tar-Pit
Turist
Turnaround Time
Turnkey
TV
TV monitor
Tweak
Tweeter
TWENEX:
Twiddle
Twilight Zone
Twink
Twirling Baton
Twit
Two Person Integrity
Two Pi
Two windows attack
Two-factor authentication
Twonkie
Two-Out-Of-Five Code
Two-Part Code
Two-Person Control
Two-Person Integrity
Two-Way Encryption
TWX
Type 1 Magnetic Media
Type 1 Product
Type 2 Magnetic Media
Type 2 Product
Type 3 Algorithm
Type 4 Algorithm
Type Accreditation
Type Of Event
Tolerance
The permissible range of variation of some characteristic from its nominal value.