Glossary- T Flashcards Preview

CISA > Glossary- T > Flashcards

Flashcards in Glossary- T Deck (41):
1

T-1

A common carrier standard protocol for transporting voice and data. T-1 can sup- port up to 24 separate voice channels of 64 kbit/sec each and is used primarily in North America.

2

T-3

A common carrier standard protocol for transporting voice and data. T-3 can sup- port up to 672 separate voice channels of 64 kbit/sec each and is used primarily in North America.

3

table

A unit of storage in a relational database management system (rDBMS) that can be thought of as a list of records. See also relational database management system.

4

tablet

A mobile device with a touch screen interface. See also mobile device.

5

tailgating

A technique used by intruders who attempt to enter a building; they may follow an employee into a building without showing their own security credentials (for example, a keycard).

6

tape management system (TMS)

An information system that is used to manage tape media, usually for the purpose of performing information backup. See also backup.

7

TCP/IP network model

The four-layer network model that incorporates encapsula- tion of messages. The TCP/IP suite of protocols is built on the TCP/IP network model.

8

technical control

A control that is implemented in IT systems and applications.

9

technical requirements

Formal statements that describe the required technical char-
acteristics that a system must support.

10

technology standard

A standard that specifies the software and hardware technolo- gies that are used by the IT organization.

11

TELNET

A TCP/IP application layer protocol that is used to establish a command- line session on a remote computer. TELNET does not encrypt user credentials as they are transmitted over the network, and has been largely replaced by SSH. See also secure shell (SSH).

12

terminal emulation

A software program that runs on a workstation that emulates an older-style computer terminal.

13

termination

The process of discontinuing employment of an employee or contractor.

14

terrorist

A person or group who perpetrates violence for political or religious reasons.

15

test plan

The list of tests that are to be carried out during a unit test or system test. See also unit testing, system testing.

16

test server

Any type of server that is used to test features; a test server does not per- form production tasks.

17

thick client

A workstation that contains a fully functional operating system and ap- plication programs.

18

thin client

A workstation that contains a minimal operating system and little or no data storage.

19

threat

An event that, if realized, would bring harm to an asset.

20

time bomb

See logic bomb.

21

time division multiple access (TDMA)

An airlink standard for wireless communica- tions between mobile devices and base stations.

22

time of check/time of use (TOC/TOU)

See race condition.

23

time synchronization

A network-based service that is used to synchronize the time
clocks on computers connected to a network.

24

timebox management

A project management technique where a large project is bro- ken down into smaller components and time periods.

25

token

A small electronic device that is used in two-factor authentication. A token may display a number that the user types in to a login field, or it may be plugged into a workstation to complete authentication. See also two-factor authentication.

26

Token Ring

A standard protocol for assembling a stream of data into frames for trans- port over a physical medium from one station to another on a local area network. On a Token Ring network, a three-byte token is passed from station to station over the network. A station may not transmit a packet to another station until it has first re- ceived the token.

27

tolerable error rate

The highest number of errors that can exist without a result being materially misstated.

28

toll fraud

An attack on a private branch exchange (PBX) that results in stolen long- distance telephone service.

29

Towers of Hanoi

A complex backup media rotation scheme that provides for more lengthy retention of some backup media. Based on the Towers of Hanoi puzzle. See also backup media rotation.

30

training

The process of educating personnel; to impart information or provide an environment where they can practice a new skill.

31

transaction processing (TP) monitor

A system that manages transactions between application servers and database servers in a distributed processing environment.

32

transfer

The process of changing an employee’s job title, department, and/or responsibilities.

33

Transmission Control Protocol (TCP)

The connection-oriented protocol used in the TCP/IP suite of protocols to establish a connection and transport messages from one station to another over a network during a communication session.

34

transport

Layer 4 of the OSI network model. See also OSI network model.

OR

Layer 3 of the TCP/IP network model. The purpose of the transport layer is the controlled and ordered delivery of messages (called packets) from one application on a station to another on the same network or on different networks. See also TCP/IP network model.

35

Transport Layer Security (TLS)

An encryption protocol used to encrypt webpages requested with the HTTPS (Hypertext Transfer Protocol/Secure) URL. Replacement for Secure Sockets Layer (SSL). See also Secure Sockets Layer (SSL), Hypertext Transfer Protocol Secure (HTTPS).

36

Trojan horse

A type of malware where programs are purported to perform one func- tion, but which actually perform other (or additional) undesired functions.

37

trunk

A telecommunications network technique where several communications can share a set of lines or frequencies.

38

tunneling

The practice of encapsulating messages within another protocol.

39

twinax

A type of coaxial cable that uses two inner conductors.

40

twisted-pair cable

A type of network cabling that consists of a thick cable containing four pairs of insulated copper conductors, all surrounded by a protective jacket.

41

two-factor authentication

Any means used to authenticate a user that is stronger than the use of a user ID and password. Examples of two-factor authentication include digital certificate, token, smart card, or biometric.