Glossary
Term | Description |
---|---|
Trusted Platform Module (TPM) |
A cryptoprocessor chip on a mainboard used to store and process cryptographic keys for the purposes of a hardware supported/implemented hard drive encryption system.
|
Trusted recovery |
Ability to ensure recovery without compromise after a system failure.
|
Trusted third party |
An entity trusted by other entities with respect to security related services and activities, such as a certification authority.
|
Tuple |
A record or row in a database.
|
Turnstile |
A form of gate that prevents more than one person at a time from gaining entry and often restricts movement in one direction.
|
Twisted-pair wire |
A communication medium that consists of pairs of wires that are twisted together and bound into cable.
|
Two-factor authentication |
The use of two independent mechanisms for authentication; for example, requiring a smart card and a password.
|
Two-person control |
Continuous surveillance and control of positive control material at all times by a minimum of two authorized individuals, each capable of detecting incorrect and unauthorized procedures with respect to the task being performed, and each familiar with established security and safety requirements.
|
Type 1 authentication factor |
Something you know, such as a password, personal identification number (PIN), combination lock, passphrase, mother’s maiden name, or favorite color.
|
Type 2 authentication factor |
Something you have, such as a smart card, ATM card, token device, or memory card.
|