The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Transport Layer Security (TLS)
Transport Layer Security (TLS): A cryptographic protocol designed to provide secure communication across a network. The protocol uses asymmetric cryptography for authentication, symmetric encryption for privacy, and message authentication codes for message integrity. It's extensively used in web browsing, email, instant messaging, and voice-over-IP (VoIP), among other applications.
- Transport Mode (in IPSec)
Transport Mode (in IPSec): In IPSec, transport mode encrypts only the payload of the IP packet, not the IP header itself, which is left intact. It's mainly used for end-to-end communications, such as encrypting data for VPN connections between two hosts.
- Transposition and Permutation
Transposition and Permutation: In cryptography, transposition refers to rearranging the characters in a message, while permutation involves rearranging bits, bytes, or other parts of data according to a specific rule or system. Both techniques are used to obscure the content for security purposes.
- Trapdoor function
Trapdoor function: A function that is easy to compute in one direction but believed to be difficult to compute in the opposite direction without special information, called a 'trapdoor'. These functions are essential in the construction of encryption algorithms, particularly public-key cryptosystems.
- Tree Topology
Tree Topology: A type of network topology structured in a hierarchy, with a single 'root' node (typically a switch or a hub) that connects multiple sets of 'branches' (sub-networks), resembling a tree structure. It allows for the expansion of an existing network and is instrumental in organizing the networks in a manageable fashion.
- Trivial File Transfer Protocol (TFTP)
Trivial File Transfer Protocol (TFTP): A simplified version of the FTP protocol that is used to transfer files over networks. Unlike FTP, it doesn't require user authentication and operates on UDP, making it faster but less secure. It is commonly used in devices like routers or IP phones for firmware or configuration uploads.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access