tables, row-level access to, 234
tampering with data, 249
tcpvcon utility, 144
tcpview tool, 139
technical feasibility analysis, 291
technical planning, long-term, 65
technical threats, identifying, 362
technical training classes, 29
temperatures, in data centers, 93
TEMPEST project, 93
termination procedures, 75-76
terms, standard, 302
testing process, 296-298
third-party services
logical access by, 73-74
reviewing processes for managing, 73
threats, 352
administrative, 363
business, 361-362
financial threats, 361
legal threats, 361-362
overview, 361
regulatory threats, 362
failure to identify, 354-355
physical, 362-363
process component threats, 363-364
quantifying, 364
technical, 362
tools and technology, 161
training
overview, 28
reviewing and evaluating processes for, 70
sources of, 29-30
transaction tracing, 255
Transport Layer Security (EAP-TLS), 269
transportation of media, 77-78
transportation-related hazards, data center proximity to, 89
Treadway Commission, 308
Trojan horses, 242
trouble ticketing system, 273, 277
trunk autonegotiation, 126
trust, 19
Tunneled Transport Layer Security (EAP-TTLS), 269