| < Free Open Study > |
|
TACACS (Terminal Access Controller Access Control System), 32-33, 44, 57
Task-Based Access Control (TBAC), 32
TBAC (Task-Based Access Control), 32
(TCP / IP) Transmission Control Protocol / Internet Protocol, 112-114
TEA algorithm, 160
Teardrop attacks, 37
Telecom / PBX, 132
Telnet, 129, 291
'Ten Commandments of Computer Ethics,' 311-312
'Ten Immutable Laws of Security,' 23
Terminal Access Controller Access Control System (TACACS), 32-33, 44, 57
Termination, personnel, 215, 235
Terminators, 98
Terminology
databases, 291, 295-296, 299
glossary, 385-393
viruses, 339
Web sites for, 20
Terrorism, 307, 310, 319, 325
TFTP (Trivial File Transfer Protocol), 78-79
Thicknet cables, 104
Thinnet cables, 105
Thompson/Prometric site, 13
Threats
blended threat viruses, 336-337, 352, 357
computer-related crimes, 310
defined, 19
identification of, 223-224
virus threat ratings, 338, 352
3DES algorithm, 157
Three-way handshake (CHAP), 116-117
Tickets, Kerberos, 25-26
TLS (Transport Layer Security), 65, 83
Token passing systems, 101
Token rings, 135
Tokens
authentication and, 24-25, 44
defined, 19
Topologies
bus topology, 98-99
FDDI (Fiber Distributed Data Interface) Ring, 102
Mesh topology, 102
ring topology, 101-102
star topology, 100-101
Tracking, 41-42
Trademarks, 302-303
Trade secrets, 303-304, 319, 323
Transaction controls, 274
Transmission Control Protocol / Internet Protocol (TCP / IP), 112-114
Transparency, 136
Transport layer of OSI, 96-97
Transport mode encryption, 124, 135
Triple DES algorithm, 157
Trojan Horses, 254, 291, 331-333
Back Orifice Trojan Horse, 340, 353
defined and described, 334
NetBus (Backdoor Netbus), 341, 353
Trust models, 174-176, 183, 186
Tunneling and tunnel mode encryption, 125, 141
Tunnel mode encryption, 124, 135
Tuples, databases, 264
Twisted-pair cables, 105
Two-factor SSO, 235, 242-243
Twofish algorithm, 158
| < Free Open Study > |
|