Glossary
Term Description
Topology
The physical layout of network devices and connective cabling. The common network topologies are ring, bus, star, and mesh.
TPC
TwoPerson Control
Traceroute
(1) A program available on many systems that traces the path a packet takes to a destination. It is mostly used to debug routing problems between hosts. There is also a traceroute protocol defined in RFC 1393. (2) The traceroute or finger commands to run on the source machine (attacking machine) to gain more information about the attacker.
Trade Secret
Intellectual property that is absolutely critical to a business and would cause significant damage if it were disclosed to competitors and/or the public.
Traffic flow security
The protection that results from those features in some cryptography equipment that conceal the presence of valid messages on a communications circuit, usually by causing the circuit to appear busy at all times or by encrypting the source and destination addresses of valid messages.
Traffic security
A collection of techniques for concealing information about a message to include existence, sender, receivers, and duration.
Training effectiveness evaluation
Information collected to assist employees and their supervisors in assessing individual students’ subsequent onthejob performance, to provide trend data to assist trainers in improving both learning and teaching, and to be used in returnon investment statistics to enable responsible officials to allocate limited resources in a thoughtful, strategic manner among the spectrum of IT security awareness, security literacy, training, and education options for optimal results among the workforce as a whole.
Transceiver
The physical device that connects a host interface to a local area network, such as Ethernet. Ethernet transceivers contain electronics that apply signals to the cable and sense collisions.
Transferring Risk
Placing the cost of loss from a realized risk onto another entity or organization, such as purchasing insurance. Also referred to as assigning risk.
Transitive Trust
The concept that if A trusts B and B trusts C, then A inherits trust of C through the transitive property, which works like it would in a mathematical equation: if A = B, and B = C, then A = C. Transitive trust is a serious security concern because it may enable bypassing of restrictions or limitations between A and C, especially if A and C both support interaction with B.