- Technology infrastructure The composite hardware, software, network resources, and services required for the operation, management, and delivery of IT services and solutions. This infrastructure supports the delivery and processing of information across an organization.
- Technology infrastructure plan A document that outlines the design, implementation, and maintenance of an organization's technology infrastructure. It is used to align technology investments with business goals and to ensure the availability, performance, and security of the infrastructure. Examples include plans for deploying new servers, upgrading network components, and implementing disaster recovery procedures.
- Telecommunications This term refers to the transmission of signals, signs, messages, writings, images, sounds, or information of any nature by wire, radio, optical, or other electromagnetic systems. In cybersecurity, it encompasses the protection of data as it is transmitted across these various channels.
- Telephony The technology and processes used for transmitting voice communications, such as telephone calls and voicemail. It is used to enable people to communicate with each other over long distances. Examples include landline phones, mobile phones, and Voice over IP (VoIP) systems.
- Teleprocessing Teleprocessing is the processing of information that supports remote communication between computer systems and related devices, allowing users to interact with a computer from a distance. It encompasses the use of telecommunications to transmit data for processing and the results back to the user.
- Telnet An older network protocol for accessing remote computers, Telnet is used for command-line interfacing with servers and network devices. Due to its lack of encryption, it is now superseded by more secure protocols, such as SSH, for remote access in security-conscious environments.
- TEMPEST An unofficial acronym for a set of standards for limiting electric or electromagnetic emissions emanating from electronic equipment. These standards help prevent eavesdropping on sensitive information through the interception of these emissions. Compliance with TEMPEST standards is an aspect of securing classified and sensitive information.
- Temporal Key Integrity Protocol (TKIP) TKIP is a security protocol used in wireless networking to provide a more secure encryption method than WEP. It dynamically generates a new key for each packet, reducing the risk of key compromise. TKIP was later superseded by more secure protocols like WPA2.
- Teredo A tunneling protocol designed to grant IPv6 connectivity to networks behind IPv4 NAT devices. Teredo encapsulates IPv6 packets within IPv4 UDP datagrams, promoting interoperability between the two IP versions during the transition to IPv6.
- Test coverage analysis The method used to evaluate the extent to which a system or software application has been tested. It helps to identify gaps in testing, areas that have not been tested, or areas where testing may be too dense. From a security perspective, ensuring adequate test coverage is crucial to uncovering and fixing potential vulnerabilities and flaws, thereby minimizing the risk of security breaches and strengthening the overall robustness of the system.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.