The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- TACACS+ (Terminal Access Controller Access-Control System Plus)
TACACS+ (Terminal Access Controller Access-Control System Plus): An authentication protocol that provides centralized validation of users attempting to gain access to network resources. TACACS+ improves security by allowing for separate authentication, authorization, and accounting procedures.
- Take-Grant Model
Take-Grant Model: A formal model used to understand how permission and rights can be transferred between subjects in a system based on a set of rules for 'taking' and 'granting' these rights. While not typically deployed in practical systems, it aids in the conceptual understanding of access rights propagation.
- Target of Evaluation (TOE)
Target of Evaluation (TOE): A set of software, firmware, and/or hardware components that are the subject of a security evaluation process. The TOE defines the boundaries of the product or system to be tested, including its security functions, interfaces, and implementation. By establishing a TOE, evaluators can systematically identify vulnerabilities, assess risks, and verify the effectiveness of security controls.
- The Australian Privacy Act of 1988
The Australian Privacy Act of 1988: A law that regulates the handling of personal information about individuals. This includes the collection, use, storage, and disclosure of personal information and access to and correction of that information. It includes thirteen Australian Privacy Principles that outline standards, rights, and obligations around these processes and applies to most Australian Government agencies, all private sector and not-for-profit organizations with an annual turnover of more than $3 million, all private health service providers, and some small businesses.
- Ticket Granting Server (TGS) (in Kerberos)
Ticket Granting Server (TGS) (in Kerberos): The server responsible for providing service tickets to authenticated clients. After a client has been authenticated and received a Ticket Granting Ticket (TGT), they can then request specific service tickets from the TGS. These service tickets are used to authenticate the client to various resources on a network, without needing to repeatedly supply the original login credentials.
- Token ring
Token ring: A type of computer network topology where each machine is connected to the network in a closed loop or ring. Each computer or server is connected to the next, creating a circular network path. Data packets travel around the ring, stopping at each node. If the data is not recognized by the node, it is passed along to the next node in the ring.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access