Glossary
Term Description
Trusted Platform Module (TPM)
A cryptoprocessor chip on a mainboard used to store and process cryptographic keys for the purposes of a hardware supported/implemented hard drive encryption system.
Trusted recovery
Ability to ensure recovery without compromise after a system failure.
Trusted third party
An entity trusted by other entities with respect to security related services and activities, such as a certification authority.
Tuple
A record or row in a database.
Turnstile
A form of gate that prevents more than one person at a time from gaining entry and often restricts movement in one direction.
Twisted-pair wire
A communication medium that consists of pairs of wires that are twisted together and bound into cable.
Two-factor authentication
The use of two independent mechanisms for authentication; for example, requiring a smart card and a password.
Two-person control
Continuous surveillance and control of positive control material at all times by a minimum of two authorized individuals, each capable of detecting incorrect and unauthorized procedures with respect to the task being performed, and each familiar with established security and safety requirements.
Type 1 authentication factor
Something you know, such as a password, personal identification number (PIN), combination lock, passphrase, mother’s maiden name, or favorite color.
Type 2 authentication factor
Something you have, such as a smart card, ATM card, token device, or memory card.