Cybersecurity Definitions T 0 0

T1 t3

A t1, t3 is a digital circuit using tdm (time-division multiplexing).

Tamper

Tamper is defined as deliberately trying to change or alter a system’s logic, data, or control information to cause the system to perform unauthorized functions or services.

Tcp fingerprinting

Tcp/ip stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may be used to infer the remote machine’s operating system (os), or incorporated into a device fingerprint.

Tcp full open scan

A tcp full open scan checks each and every port after performing a full three-way handshake on each port to determine if it was open.

Tcp half open scan

A tcp half open scan determines if a port is open by performing the first half of a three-way handshake. It is also referred to as syn scanning. In syn scanning, the hostile client or attacker attempts to set up a tcp/ip connection with a server at every possible port. This is done by sending a syn (synchronization) packet, as if to initiate a three-way handshake, to every port on the server.

Tcp wrapper

A tcp wrapper is a software package that is used to restrict access to certain network services based on the source of the connection. In other words, it is a host-based networking acl system, used to filter network access to internet protocol servers on (unix-like) operating systems such as gnu/linux or bsd.

Tcpdump

A tcpdump is a freeware protocol analyzer for unix systems that can monitor network traffic on a wire. It allows the user to display tcp/ip and other packets being transmitted or received over a network. Tcpdump works on most unix-like operating systems: linux, solaris, bsd, os x, hp-ux, android and aix among others. It was originally written in 1987 by van jacobson, craig leres and steven mccanne who were working in the lawrence berkeley laboratory network research group.

Tcp ip

Tcp/ip stands for transmission control protocol/internet protocol. It is a basic communication language or protocol of the internet and can be used as a communications protocol in a private network as well (either an intranet or an extranet).

Telnet

Telnet is a tcp-based, application-layer, internet standard protocol and an essential tcp/ip protocol for accessing remote computers. Through telnet, an administrator or another user can access someone else’s computer remotely.

Threat agent

An individual or group that acts, or has the power to , exploit a vulnerability or conduct damaging activities.

Threat assessment

Threat assessment is a structured process used to identify and evaluate various risks or threats that an organization might be exposed to.

Threat model

A threat model is a process that is used to optimize network security by identifying the key objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system or network.

Threat vector

A threat vector is a methodology that a threat uses to get to the target.

Threat

A threat is a possible danger that might exploit a vulnerability to violate security protocols and thus, cause possible harm. A threat can be either deliberate (example, an individual cracker or a criminal organization) or accidental (example, the possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.

Time to live

Time to live (ttl) or the hop limit is a mechanism that limits the lifespan of data in a computer or network. Ttl is generally implemented as a counter or time stamp attached to or embedded in the data. Ttl value in an ip data packet tells a network router whether or not the packet has been in the network too long and should be discarded.

Tiny fragment attack

A tiny fragment attack is ip fragmentation that is the process of breaking up a single internet protocol (ip) datagram into multiple packets of smaller size. Every network link has a characteristic size of messages that may be transmitted, called the maximum transmission unit (mtu). If the data packet size is made small enough to force some of a tcp packet’s tcp header fields into the second data fragment, filter rules that specify patterns for those fields will not match. If the filtering implementation does not enforce a minimum fragment size, a disallowed packet might be passed because it didn’t hit a match in the filter. Std 5, rfc 791 states that, “every internet module must be able to forward a datagram of 68 octets without further fragmentation.” This is because an internet header may be up to 60 octets, and the minimum fragment is 8 octets. Ip fragmentation exploits (attacks) use the fragmentation protocol within ip as an attack vector.

Token based access control

Token-based access control is an authentication method that offers additional security. Using this method, each user has a smart card or token that either displays a constantly changing password, passkey, or buttons that calculate a new password based on a challenge phrase. Without this card or token, it is impossible to authenticate yourself to the system. This two-factor authentication provides additional security by requiring an attacker to both guess the user’s password and steal the smart card or token that is used to access the system.

Token based devices

A token-based device or a security token is known by several names such as, hardware token, authentication token, usb token, cryptographic token, software token, virtual token, or key fob. A security token may be a physical device that an authorized user is given to access a system or network. Security tokens are used to prove one’s identity electronically and are used in addition to or in place of a password to prove that the customer is who they claim to be. The token acts like an electronic key to access something.

Token ring

A token ring network is a local area network in which all computers are connected in a ring or star topology and a binary digit or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. It uses a special three-byte frame called a “token” that travels around a logical “ring” of workstations or servers.

Topology

Topology is the geometric arrangement of a computer system. Common topologies include a bus, star, and ring. Two networks have the same topology if the connection configuration is the same, although the networks may differ in physical interconnections, distances between nodes, transmission rates, and/or signal types.

Traceroute tracert exe

Traceroute is a tool that maps the route a packet takes from the local machine to a remote destination. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path). The sum of the mean times in each hop indicates the total time spent to establish the connection.

Transmission control protocol tcp

Transmission control protocol (tcp) is a set of rules or protocols that is used along with the internet protocol to send data in the form of message units between computers over the internet. Whereas the ip protocol deals only with packets, tcp enables two hosts to establish a connection and exchange streams of data. Tcp takes care of keeping track of the individual units of data called packets. Tcp guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. It originated in the initial network implementation in which it complemented the internet protocol (ip). Therefore, the entire suite is commonly referred to as tcp/ip.

Transport layer security tls

Transport layer security (tls) is a protocol that ensures privacy between communicating applications and the users on the internet. When a server and client communicate, tls ensures that no third party may overhear or tamper with any message. Tls is the successor to the secure sockets layer (ssl).

Triple des

Triple des (3des) is the common name for the triple data encryption algorithm (tdea or triple dea) symmetric-key block cipher, which applies the data encryption standard (des) cipher algorithm three times to each data block. It transforms each 64-bit plaintext block by applying the des three successive times, using either two or three different keys, for an effective key length of 112 or 168 bits.

Triple wrapped

Triple wrapped describes any data that has been signed with a digital signature, encrypted, and then signed again is called triple-wrapped.

Trojan horse

A trojan horse is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorization of a system entity that invokes the program.

Trunking

Trunking is a method for a system to provide network access to many clients by sharing a set of lines or frequencies instead of providing them individually. This is analogous to the structure of a tree with one trunk and many branches.

Trust

Trust determines which permissions and what actions other systems or users can perform on remote machines.

Trusted certificate

A trusted certificate is any digital certificate that a certificate user accepts as being valid without testing the certificate to validate it as the final certificate on a certification path; especially a certificate that is used as a trust anchor certificate.

Trusted ports

Trusted ports are ports below number 1024 usually allowed to be opened by the root user.

Tunnel

A tunnel is a communication channel that is created in a computer network by encapsulating a communication protocol’s data packets in a second protocol that normally would be carried above, or at the same layer as, the first one. Most often, a tunnel is a logical point-to-point link created by encapsulating the layer 2 protocol in a transport protocol (such as tcp), in a network or inter-network layer protocol (such as ip), or in another link layer protocol. Tunneling can move data between computers that use a protocol not supported by the network connecting them.

** The time is base on America/Chicago timezone