TACACS (Terminal Access Controller Access Control System), 60–61, 111–112, BC27
Take-Grant model, 234, BC27
Target of Evaluation (TOE), 239
TCB (Trusted Computing Base), 229–230, BC27
TCP (Transmission Control Protocol), 95, 96, BC27
TCP/IP (Transmission Control Protocol/Internet Protocol) model, 100
TCSEC (Trusted Computer System Evaluation Criteria), 235–239, BC27
Teardrop attack, 118, BC27
technical controls
definition, 41
for Physical (Environmental) Security domain, 349–351
Telecommunications and Network Security domain. See also network; OSI model
definition, 20, 73
prep test questions about, 120–122
resources for, 119
Telnet, 99, BC27
Terminal Access Controller Access Control System (TACACS), 60–61, 111–112, BC27
termination practices, 134–135, 257
terrorist attacks, 279, 309, 342
test. See exam; practice exam on CD-ROM; prep test questions in this book
Test of English as a Foreign Language (TOEFL), 17
testing
black box testing, 68, BC4
grey box testing, 68, BC12
penetration testing, 67, 267–269, BC19
unit testing, 166
vulnerability testing, 67
white box testing, 68, BC30
TFTP (Trivial File Transfer Protocol), 99
theft, 254, 255, 342
thick coaxial cable (RG8 or RG11), 78, 80
thicknet, 78, 80
thin coaxial cable (RG58), 78, 80
thinnet, 78, 80
threat, 139, 253–256, BC27
threat analysis, 140–141
3DES (Triple DES), 201–202, BC1
three-factor authentication, 44
ticket-based authentication, 55–59
TNI (Trusted Network Interpretation), 239, BC28
TOE (Target of Evaluation), 239
TOEFL (Test of English as a Foreign Language), 17
token, BC28
token ring, BC28
token-passing networks, 83
Token-Ring protocol, 84
Top Secret information, 129
tort law (civil law), 304–306, BC6
trade secret, 314, BC28
trademark, 313, BC28
traffic analysis, 180, 271, BC28
training courses, 15, 147
transference (risk assignment), 144, BC22
transformation procedures (TP), 66, 235
transient, BC28
Transmission Control Protocol (TCP), 95–96, BC27
Transmission Control Protocol/Internet Protocol (TCP/IP) model, 100
Transport Layer (Layer 4), OSI model, 94–97
transport mode, IPSec, 107, 215
transposition cipher, 192–193, BC28
trap door (logic bomb), 176, BC28
trapdoor (private key), 205
trend analysis, 271
Triple DES (3DES), 201–202, BC1
Trivial File Transfer Protocol (TFTP), 99
Trojan horse, 174–175, BC28
trust relationships, 61
trusted computer system, BC28
Trusted Computer System Evaluation Criteria (TCSEC), 235–239, BC27
Trusted Computing Base (TCB), 229–230, BC27
Trusted Network Interpretation (TNI), 239, BC28
trusted path, BC28
trusted recovery, 261–262, BC28
trusted subject, 233
tunnel mode, IPSec, 107, 215
twisted pair cable, 78–79, 80
Two-Factor authentication, 44, 54, BC29
Twofish algorithm, 203
Type I Error (False Reject Rate), 49, 349, BC12
Type II Error (False Accept Rate), 49, 349, BC12