Token
Token: A digital identity representation that serves as evidence of a transaction, authentication, or permission within a system. Tokens usually contain protected, cryptographically secured data, such as user authentication credentials, which can be used to gain access to network services or carry out certain transactions.
TOPT (Time-based One-Time Password)
TOPT (Time-based One-Time Password): A temporary, unique passcode used for authentication that expires after a short period, typically every 30 or 60 seconds. It synchronizes with a server to enhance security in two-factor authentication systems by minimizing the risk of password-related breaches.
Ticket Granting Server (TGS) (in Kerberos)
Ticket Granting Server (TGS) (in Kerberos): The server responsible for providing service tickets to authenticated clients. After a client has been authenticated and received a Ticket Granting Ticket (TGT), they can then request specific service tickets from the TGS. These service tickets are used to authenticate the client to various resources on a network, without […]
Time Of Day Restrictions
Time Of Day Restrictions: Constraints placed on a user’s access to a system or network based on the time of day. For instance, an organization might limit the hours during which certain users can access specific resources to mitigate the risk of unauthorized access or misuse. This is particularly common in environments that require high […]
TACACS+ (Terminal Access Controller Access-Control System Plus)
TACACS+ (Terminal Access Controller Access-Control System Plus): An authentication protocol that provides centralized validation of users attempting to gain access to network resources. TACACS+ improves security by allowing for separate authentication, authorization, and accounting procedures.
Technical controls
Technical controls: Security measures that are based on the use of technology, such as hardware, software, and networking components. They are used to protect against threats and vulnerabilities in a system or network. Examples include firewalls, intrusion detection systems, and encryption algorithms.