- Threat Intelligence - Internal Information about potential risks that come from within an organization. This can include suspicious activities or behavior patterns of employees, contractors, or other individuals with access to the organization's resources. Gathering and analyzing internal threat intelligence can help an organization to proactively detect and respond to insider threats, thereby reducing potential damage.
- Threat modeling The process of identifying, understanding, and addressing potential threats in a prioritized way. It involves creating a conceptual model of the system or application, including data flow and connectivity, and then identifying assets, threats, and vulnerabilities within this model. The purpose is to mitigate possible security risks during the design phase of a system rather than after deployment.
- Threat monitoring The continual process of observing and tracking activities within a system or network to detect signs of cyber threats or breaches. This often involves the use of automated systems, such as intrusion detection systems (IDS) or security information and event management (SIEM) systems, which can detect anomalies or suspicious behavior and send alerts for further investigation.
- Threat Vector A pathway or means by which a cyberattack is carried out. Threat vectors are the methods or routes taken by attackers to infiltrate systems, exploit vulnerabilities, and potentially cause damage. Common vectors include phishing emails, malicious websites, or compromised networks.
- Throughput The amount of data that can be transferred from one point to another over a set period. In the context of network security, high throughput is desirable as it means data can be transferred quickly and efficiently, but it must be balanced against potential security risks such as data breaches or unauthorized access. Monitoring throughput is also important, as unexpected changes could indicate a security issue, like a denial-of-service attack or network intrusion.
- Ticket Granting Server (TGS) (in Kerberos)The server responsible for providing service tickets to authenticated clients. After a client has been authenticated and received a Ticket Granting Ticket (TGT), they can then request specific service tickets from the TGS. These service tickets are used to authenticate the client to various resources on a network, without needing to repeatedly supply the original login credentials.
- Tier Standards (Uptime Institute) A globally recognized benchmark for the design, construction, and operation of data centers. They classify data centers into four tiers based on factors such as redundancy, fault tolerance, and availability. Tier I represents basic capacity with non-redundant components, while Tier IV denotes fault-tolerant infrastructure. This classification helps organizations determine the level of service they require from a data center, balancing operational capabilities against cost and business needs.
- Time bomb A malicious piece of code that has been programmed to activate at a specific time or under certain conditions. Unlike a logic bomb, which triggers when a particular event occurs, a time bomb is set to activate on a particular date or after a set amount of time has passed. These are typically used to cause disruption or damage to a system or network, and their delayed activation can make them difficult to detect before they execute.
- Time-Division Multiplexing (TDM) A communication process that transmits multiple data streams over a single medium by dividing the signals into separated time slots. By employing this approach, multiple users or processes can share the same communication channel without significant interference or signal degradation, promoting the efficient use of network resources.
- Time-of-Check to Time-of-Use (TOCTOU) Attack A security exploit that takes advantage of the timing window between checking a condition (like a file's attributes) and using it (opening the file). Attackers exploit this window to manipulate conditions and gain unauthorized access or perform illicit actions, challenging systems to ensure a consistent state between verification and action.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.