T

« Back to Glossary Index

Tailgating: A social engineering tactic in which unauthorized people follow an

Tamper: To deliberately alter a system’s logic, data, or control information to cause the system to perform unauthorized functions or services.

TCP Fingerprinting:  TCP fingerprinting is the user of odd packet header combinations to determine a remote operating system.

TCP/IP:  A synonym for “Internet Protocol Suite;” in which the Transmission Control Protocol and the Internet Protocol are important parts. TCP/IP is the basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an Intranet or an Extranet).

TCP/IP Model: A framework used to visualize how data is organized and transmitted across a network

TCP Dump: A command-line network protocol analyzer

Technical Skills: Skills that require knowledge of specific tools, procedures, and

Telemetry: The collection and transmission of data for analysis tell each other about data transmission errors across the network

TELNET: A TCP-based, application-layer, Internet Standard protocol for remote login from one host to another.

Test: A procedure intended to establish the quality, performance, or reliability of something, especially before it is taken into widespread use.

Threat: A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.

Threat Actor: Any person or group who presents a security risk

Threat Assessment: A threat assessment is the identification of types of threats that an organization might be exposed to.

Threat Hunting: The proactive search for threats on a network

Threat Intelligence: Evidence-based threat information that provides context about

Threat Model: A threat model is used to describe a given threat and the harm it could to do a system if it has a vulnerability.

Threat Modeling: The process of identifying assets, their vulnerabilities, and how each

Threat Vector: The method a threat uses to get to the target.

Threat: Any circumstance or event that can negatively impact assets

Topology: The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. The specific physical, i.e., real, or logical, i.e., virtual, arrangement of the elements of a network. Note 1: Two networks have the same topology if the connection configuration is the same, although the networks may differ in physical interconnections, distances between nodes, transmission rates, and/or signal types. Note 2: The common types of network topology are illustrated.

Traceroute (tracert.exe): Traceroute is a tool the maps the route a packet takes from the local machine to a remote destination.

Traffic Light Protocol: A set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience.

Transferable Skills: Skills from other areas that can apply to different careers

Transmission Control Protocol (TCP): A set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.

Transport Layer Security (TLS): A protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer.

transport, and storage of information

Triage: The prioritizing of incidents according to their level of importance or urgency

Trojan Horse: A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

True Negative: A state where there is no detection of malicious activity

True Positive: An alert that correctly detects the presence of an attack

Trust: Trust determine which permissions and what actions other systems or users can perform on remote machines.

Trusted Ports: Trusted ports are ports below number 1024 usually allowed to be opened by the root user.

Tunnel: A communication channel created in a computer network by encapsulating a communication protocol’s data packets in (on top of) a second protocol that normally would be carried above, or at the same layer as, the first one. Most often, a tunnel is a logical point-to-point link – i.e., an OSI layer 2 connection – created by encapsulating the layer 2 protocol in a transport protocol (such as TCP), in a network or inter-network layer protocol (such as IP), or in another link layer protocol. Tunneling can move data between computers that use a protocol not supported by the network connecting them.

Tuple Data: Data structure that consists of a collection of data that cannot be changed

Type Error: An error that results from using the wrong data type

« Back to Glossary Index

Shopping Cart0

Cart