- Table look-up The process of searching for a specific value or record in a table or database. It is used in various industries, including healthcare, finance, and information technology, to quickly retrieve and analyze data. Examples include searching for a patient's medical history in a hospital database, looking up a customer's account information in a bank's system, and searching for a specific product on an e-commerce website.
- Tabletop exercise A simulation of a hypothetical emergency situation, typically involving a group of individuals who play different roles and must respond to the scenario. It is used in disaster preparedness and response planning, as well as in training and development for emergency management personnel. Examples include simulating a natural disaster, a cyber-attack, or a terrorist attack and evaluating the response and preparedness of the individuals involved.
- TACACS+ (Terminal Access Controller Access-Control System Plus)An evolution of the TACACS protocol that provides additional functionality and security. While it serves similar purposes as its predecessor —authentication, authorization, and accounting— TACACS+ encrypts the entirety of its packet content, providing better security for transmitted data. TACACS+ is widely utilized in network environments to control access to network equipment and validate users' privileges, making network management more secure and efficient.
- Tailgating The unauthorized access to a restricted area by following someone who has legitimate access. It is a common security risk, especially in physical security environments such as buildings and facilities. Examples include an unauthorized person following an employee into a secured office building, or a visitor following a resident into a gated community.
- Tailoring The process of customizing or adapting a security solution or standard to fit the specific needs and requirements of an organization. It is used in various industries, including information technology, healthcare, and finance, to ensure that security measures align with the unique risks and challenges faced by the organization. Examples include tailoring a security policy to address specific vulnerabilities in an organization's network or adapting a security standard to comply with industry regulations.
- Take-Grant ModelA formal model used to understand how permission and rights can be transferred between subjects in a system based on a set of rules for 'taking' and 'granting' these rights. While not typically deployed in practical systems, it aids in the conceptual understanding of access rights propagation.
- Tampering The act of deliberately altering or damaging a system or device without authorization. It is a common security concern, especially in the context of information technology, where tampering can lead to data breaches or loss of integrity. Examples include modifying a computer program to gain unauthorized access to a system or tampering with a security camera to disable its surveillance capabilities.
- Tangible asset A physical property or item that has value and can be owned or controlled by an individual or organization. It is a common term in accounting and finance, where tangible assets are used to assess the value and performance of a company. Examples include buildings, equipment, machinery, and inventory.
- Tape Management System (TMS) A software or hardware solution that manages the storage, organization, and retrieval of data on tape media. It is commonly used in large-scale data backup and recovery operations, where tapes are used as a long-term storage medium. Examples include tape libraries, tape robots, and tape cataloging systems.
- Target A specific entity or system that is the focus of an attack or a security measure. It is a common term in the field of cybersecurity, where targets can include individuals, organizations, networks, or devices. Examples include targeting a specific individual's email account for a phishing attack or targeting a company's network for a ransomware attack.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.