T


Tamper
Unauthorized modification that alters the proper functioning of cryptographic or automated information system security equipment in a manner that degrades the security or functionality it provides.
Target of Evaluation (TOE)
A Common Criteria term for an IT product or system and its associated administrator and user guidance documentation that is the subject of a security evaluation.
Technical countermeasure
A security feature implemented in hardware and/or software, which is incorporated into the network information security processing system.
Technology gap
A technology that is needed to mitigate a threat at a sufficient level, but is not available.
Third-party trusted host model
An authentication model in which a trusted third party authenticates principals to each other. The trusted third party shares a secret (password) with each principal. It uses a key derived from the password to issue tickets to these principals.

See also Kerberos.

Threat
An event with the potential to adversely impact an information system via unauthorized access. The potential source of an adverse event.
Threat agent
Entity used to exploit vulnerabilities in an information system, operation, or organizational or governmental infrastructure.
Threat assessment
A process that formally defines and evaluates the degree of threat an information system may be exposed to in an attack scenario.
Ticket
A credential used in a third-party trusted host model. A ticket is encrypted with the password of the principal to whom the ticket is presented. A ticket contains a session key as well as the identity of the principal to whom the ticket is issued. Tickets have an expiration time.
Time Division Multiple Access (TDMA)
A technique to interweave multiple conversations into one transponder so as to appear to get simultaneous conversations.
Tinkerbell program
A program that operates in the background monitoring network traffic in order to generate alerts when calls are received from particular sites or when logins are attempted using certain IDs.
Token
An object that represents something else, such as another object (either physical or virtual). A security token is a physical device, such as a special SmartCard, that together with something that a user knows , such as a PIN, will enable authorized access to a computer system or network.
Trace packet
Used in packet-switching networks, a special type of packet that forces a report to be generated and sent to a network control center during each stage of its progression across the network.
Trace route
An operation that uses trace packets and records the sequence of addressing obtained from User Datagram Protocol packets sent from the local host to a remote host. The output record normally displays time, address of the route taken, and a sequence number or "hop ID" used to reach its destination address.
Trojan horse
1. A program that performs a desired task, but that also includes unexpected (and undesirable) functions. Consider as an example an editing program for a multiuser system. This program could be modified to randomly delete one of the user's files each time a useful function (editing) is performed, but the deletions are unexpected and definitely undesired . 2. A software application containing hidden code that enables the unauthorized collection, alteration, or destruction of information. 3. A non-self-replicating program that seems to have a useful purpose, but in reality has a different, malicious purpose.
Trusted applet

See Signed applet.

Trusted computer system
"A system that employs sufficient hardware and software integrity measures to allow its use for processing simultaneously a range of sensitive or classified information" [taken from page 112 of the Orange Book].
Trusted Computing Base (TCB)
The totality of protection mechanisms within a computer system ”including hardware, firmware, and software ” the combination of which is responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system. The ability of a TCB to correctly enforce a security policy depends solely on the mechanisms within the TCB and on the correct input by system administrative personnel of parameters (e.g., a user's clearance) related to the security policy [taken from Page 112 of the Orange Book].
Trusted gateway
A firewall that uses a very secure, hardened operating system. These types of operating systems are typically rated B1 or better according to the TCB Evaluation Criteria (referred to as the Orange Book). The firewall system is divided into three software compartments: (1) that which interacts with the Internet, (2) that which interacts with the enterprise, and (3) a trusted gateway that mediates communications between the other two compartments. The operating system prevents applications that run in one compartment from accessing resources outside of that compartment. Any application that runs on the Internet compartment (e.g., a Web server) can only have access to resources in the Internet compartment (e.g., public HTML pages), or else it must use the trusted gateway to ask for information from the enterprise compartment .
Trusted operating system
A trusted operating system is part of a trusted computing base that has been evaluated at an assurance level necessary to protect the data that will be processed .

See also Trusted computer system.

See also Trusted Computing Base (TCB).

Tunneling
A connection process whereby both sender and receiver begin encapsulating a network protocol within packets carried by another network.
Tunneling router
A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network for eventual deencapsulation and decryption.



Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net