top of page

Cyber Terminologies and Fundamentals

Definitions 

Threat Intelligence

Information about cyber threats used to proactively defend against attacks.

Two-Factor Authentication (2FA)

An authentication method requiring two different types of verification to access a system.

Trusted Platform Module (TPM)

A hardware security component used for cryptographic operations and secure storage.

Token-Based Authentication

A method where users authenticate using tokens instead of passwords.

Telemetry Data Security

Protecting data collected remotely from devices or applications.

Traffic Analysis Attack

A technique that monitors communication patterns to infer sensitive information.

Trojan Horse

Malware disguised as legitimate software to trick users into executing it.

Time-Based One-Time Password (TOTP)

A temporary passcode that changes based on time for authentication.

Tamper Detection

Mechanisms to identify and respond to unauthorized modifications of devices or data.

Tunneling Protocols

Protocols used to encapsulate network traffic within another network to enhance security.

Tailgating Attack

A physical security breach where an unauthorized person follows an authorized individual into a restricted area.

Threat Modeling

The process of identifying and evaluating security threats in a system.

Typo Squatting

A cyberattack where attackers register misspelled domain names to trick users into visiting malicious sites.

Transmission Control Protocol (TCP) Security

Security measures to protect TCP communications from cyber threats.

Threat Hunting

Proactively searching for security threats that have evaded detection.

Transport Layer Security (TLS)

A cryptographic protocol used to secure communications over the internet.

Transparent Proxy

A proxy server that intercepts requests without requiring client configuration.

Time-of-Check to Time-of-Use (TOCTOU)

A race condition attack that exploits timing vulnerabilities in software execution.

Tabletop Exercise (TTX)

A cybersecurity training scenario where teams practice responding to incidents.

Trapdoor Attack

A hidden security vulnerability in software that allows unauthorized access.

bottom of page