Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

T

T1, T3

A t1, t3 is a digital circuit using TDM (time-division multiplexing).

Letter for filtering (will be hidden in prod) :

T

Transport Layer Security (TLS)

Transport layer security (TLS) is a protocol that ensures privacy between communicating applications and the users on the internet. When a server and client communicate, tls ensures that no third party may overhear or tamper with any message. Tls is the successor to the secure sockets layer (SSL).

Letter for filtering (will be hidden in prod) :

T

Tiny Fragment Attack

A tiny fragment attack is IP fragmentation that is the process of breaking up a single internet protocol (IP) datagram into multiple packets of smaller size. Every network link has a characteristic size of messages that may be transmitted, called the maximum transmission unit (MTU). If the data packet size is made small enough to force some of a TCP packet’s TCP header fields into the second data fragment, filter rules that specify patterns for those fields will not match. If the filtering implementation does not enforce a minimum fragment size, a disallowed packet might be passed because it didn’t hit a match in the filter. STD 5, RFC 791 states that, “every internet module must be able to forward a datagram of 68 octets without further fragmentation.” This is because an internet header may be up to 60 octets, and the minimum fragment is 8 octets. IP fragmentation exploits (attacks) use the fragmentation protocol within ip as an attack vector.

Letter for filtering (will be hidden in prod) :

T

Triple DES

Triple DES (3DES) is the common name for the triple data encryption algorithm (TDEA or triple DEA) symmetric-key block cipher, which applies the data encryption standard (DES) cipher algorithm three times to each data block. It transforms each 64-bit plaintext block by applying the des three successive times, using either two or three different keys, for an effective key length of 112 or 168 bits.

Letter for filtering (will be hidden in prod) :

T

Trusted Ports

Trusted ports are ports below number 1024 usually allowed to be opened by the root user.

Letter for filtering (will be hidden in prod) :

T

Triple Wrapped

Triple wrapped describes any data that has been signed with a digital signature, encrypted, and then signed again is called triple-wrapped.

Letter for filtering (will be hidden in prod) :

T

Threat Vector

A threat vector is a methodology that a threat uses to get to the target.

Letter for filtering (will be hidden in prod) :

T

Token Ring

A token ring network is a local area network in which all computers are connected in a ring or star topology and a binary digit or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. It uses a special three-byte frame called a “token” that travels around a logical “ring” of workstations or servers.

Letter for filtering (will be hidden in prod) :

T

Tcpdump

A tcpdump is a freeware protocol analyzer for unix systems that can monitor network traffic on a wire. It allows the user to display TCP/IP and other packets being transmitted or received over a network. Tcpdump works on most unix-like operating systems: Linux, Solaris, BSD, OS X, HP-UX, Android and AIX among others. It was originally written in 1987 by Van Jacobson, Craig Leres and Steven McCanne who were working in the Lawrence Berkeley Laboratory Network Research Group.

Letter for filtering (will be hidden in prod) :

T

TCP IP

TCP/IP stands for transmission control protocol/internet protocol. It is a basic communication language or protocol of the internet and can be used as a communications protocol in a private network as well (either an intranet or an extranet).