The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Technology infrastructure plan
Technology infrastructure plan: A document that outlines the design, implementation, and maintenance of an organization's technology infrastructure. It is used to align technology investments with business goals and to ensure the availability, performance, and security of the infrastructure. Examples include plans for deploying new servers, upgrading network components, and implementing disaster recovery procedures.
- Telecommunications
Telecommunications: This term refers to the transmission of signals, signs, messages, writings, images, sounds, or information of any nature by wire, radio, optical, or other electromagnetic systems. In cybersecurity, it encompasses the protection of data as it is transmitted across these various channels.
- Telephony
Telephony: The technology and processes used for transmitting voice communications, such as telephone calls and voicemail. It is used to enable people to communicate with each other over long distances. Examples include landline phones, mobile phones, and Voice over IP (VoIP) systems.
- Teleprocessing
Teleprocessing: Teleprocessing is the processing of information that supports remote communication between computer systems and related devices, allowing users to interact with a computer from a distance. It encompasses the use of telecommunications to transmit data for processing and the results back to the user.
- Telnet
Telnet: An older network protocol for accessing remote computers, Telnet is used for command-line interfacing with servers and network devices. Due to its lack of encryption, it is now superseded by more secure protocols, such as SSH, for remote access in security-conscious environments.
- TEMPEST
TEMPEST: An unofficial acronym for a set of standards for limiting electric or electromagnetic emissions emanating from electronic equipment. These standards help prevent eavesdropping on sensitive information through the interception of these emissions. Compliance with TEMPEST standards is an aspect of securing classified and sensitive information.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
34 CISSP Mind Maps
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
29 CISM Mind Maps
-
A 200-page CISM study guide
-
89 pages of CISM Quick Sheets
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
24 CC Mind Maps
-
A 120-page CC study guide
-
35 pages of CC Quick Sheets
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access