The Cyber Glossary: Comprehensive Cybersecurity Terms
Browse alphabetically or search directly for the cybersecurity terms your team needs right now.Learn more about our mission.
T
- Tabletop ExerciseDefinition
- Tactics, Techniques, and Procedures (TTP)(Tactics, Techniques, and Procedures)
- Tailored Trustworthy SpaceDefinition
- Tamper evidentDefinition
- Tamper ResistantDefinition
- TamperingDefinition
- TargetDefinition
- Target DataDefinition
- Target Identification and Analysis TechniquesDefinition
- Target NameDefinition
- Target of Evaluation (TOE)(Target of Evaluation)
- Target Operational EnvironmentDefinition
- Target PlatformDefinition
- Target ProfileDefinition
- Target Residual RiskDefinition
- Target ValueDefinition
- Target Vulnerability Validation TechniquesDefinition
- Targeted Security StrengthDefinition
- TargetsDefinition
- TCP(Transmission Control Protocol)
- TCP Segmentation OffloadDefinition
- TCP-TLSDefinition
- TCP/IP(Transmission Control Protocol/Internet Protocol)
- TDM(Time Division Multiplexing)
- TDMA(Time Division Multiple Access)
- Technology Research and DevelopmentDefinition
- Test and EvaluationDefinition
- TGS(Ticket Granting Service)
- TGT(Ticket Granting Ticket)
- Thales TCT(Thales Trusted Cyber Technologies)
- Thales Trusted Cyber TechnologiesDefinition
- THC(The Hacker's Choice)
- The Common RuleDefinition
- The Hacker’s ChoiceDefinition
- ThreatDefinition
- Threat ActorDefinition
- Threat AgentDefinition
- Threat AnalysisDefinition
- Threat AssessmentDefinition
- Threat IntelligenceDefinition
- Threat Intelligence ReportDefinition
- Threat ModelingDefinition
- Threat MonitoringDefinition
- Threat ScenarioDefinition
- Threat ShiftingDefinition
- Threat SignalingDefinition
- ThreatscapeDefinition
- ThreatwareDefinition
- Three-key Triple Data Encryption AlgorithmDefinition
- ThresholdsDefinition
- TicketDefinition
- Time to LiveDefinition
- TimestompingDefinition
- TLS(Transport Layer Security)
- TMI(Too Much Information)
- Token AuthenticatorDefinition
- Token Factory ContractDefinition
- Token SecretDefinition
- Token Taxonomy InitiativeDefinition
- Tool ConfigurationDefinition
- Top-level DomainDefinition
- TraceabilityDefinition
- Traceability MatrixDefinition
- Traceability, MetrologicalDefinition
- TraceableDefinition
- Trade-offDefinition
- Trade-off AnalysisDefinition
- Tradecraft IdentityDefinition
- Traditional KeyDefinition
- Traffic Encryption Key (TEK)(Traffic Encryption Key)
- Traffic FilterDefinition
- Traffic Flow Confidentiality (TFC) PaddingDefinition
- Traffic Flow Security (TFS)(Traffic Flow Security)
- Traffic Light ProtocolDefinition
- Transportation Security AdministrationDefinition
- TRB(Threat Research and Behavior analysis)
- Triple Data Encryption StandardDefinition
- TrojanDefinition
- Trojan HorseDefinition
- TrojaningDefinition
- TrojanizeDefinition
- TSA(Transportation Security Administration)
- TunnelingDefinition
- Tuple DensityDefinition
- Turing completeDefinition
- Tweakable Block CipherDefinition
- Two-Factor AuthenticationDefinition
- Two-key Triple Data Encryption AlgorithmDefinition
- TyposquattingDefinition