T


[T]

TCP/IP

Transmission Control Protocol/Internet Protocol—the suite of protocols the Internet is based on.

tcpwrapper

A software tool for security that provides additional network logging and restricts service access to authorized hosts by service.

Term Rule-Based Security Policy

A security policy based on global rules imposed for all users. These rules usually rely on a comparison of the sensitivity of the resources being accessed and the possession of corresponding attributes of users, groups of users, or entities acting on behalf of users.

Terminal Hijacking

Allows an attacker on a certain machine to control any terminal session that is in progress. An attack hacker can send and receive terminal I/O while a user is on the terminal.

Threat

The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifested. A potential violation of security.

Threat Agent

Methods and things used to exploit a vulnerability in an information system, operation, or facility; fire, natural disaster, and so forth.

Threat Assessment

Process of formally evaluating the degree of threat to an information system and describing the nature of the threat.

Tiger

A software tool, that scans for system weaknesses.

Tiger Team

Government- and industry-sponsored teams of computer experts who attempt to break down the defenses of computer systems in an effort to uncover and eventually patch security holes.

Tinkerbell Program

A monitoring program used to scan incoming network connections and generate alerts when calls are received from particular sites, or when logins are attempted using certain IDs.

Topology

The map or plan of the network. The physical topology describes how the wires or cables are laid out and the logical or electrical topology describes how the information flows.

Trace Packet

In a packet-switching network, a unique packet that causes a report of each stage of its progress to be sent to the network control center from each visited system element.

Traceroute

An operation of sending trace packets for determining information; traces the route of UDP packets for the local host to a remote host. Normally traceroute displays the time and location of the route taken to reach its destination computer.

Tranquillity

A security model rule stating that the security level of an active object cannot change during the period of activity.

Tripwire

A software tool for security. Basically, it works with a database that maintains information about the byte count of files. If the byte count has changed, it will identify it to the system security manager.

Trojan Horse

An apparently useful and innocent program containing additional hidden code that allows the unauthorized collection, exploitation, falsification, or destruction of data.

Trusted Computer System Evaluation Criteria (TCSEC)

A system that employs sufficient hardware and software assurance measures to allow its use for simultaneous processing of a range of sensitive or classified information.

Trusted Computing Base (TCB)

The totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which are responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified sewcurity policy over a product or system.

Trusted Network Interpretation

The specific security features, the assurance requirements, and the rating structure of the Orange Book as extended to networks of computers ranging from isolated LANs to WANs.

TTY Watcher

A hacker tool that allows hackers with even a small amount of skill to hijack terminals. It has a GUI interface.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net