Выбрать главу

Test plan

A plan that details the specific tests and procedures to be followed when testing software.

Test procedure

Detailed instructions for the setup, execution, and evaluation of results for a given test case.

Testability

Effort required for testing a computer program to ensure it performs its intended function.

Test-word

A string of characters (a test-word) is appended by a sending institution to a transaction sent over unprotected telex/telegraph networks. The receiving institution repeats the same process using the received transaction data, and was thereby able to verify the integrity of the transaction. A test-word is an early-technology realization of a seal.

Thick client

In a client/server system, a thick client is a software application that requires programs other than just the browser on a user’s computer, that is, it requires code on both a client and server computers (e.g., Microsoft Outlook). The terms “thin” and “thick” refer to the amount of code that must be run on the client computer. Thick clients are generally less secure than thin clients in the way encryption keys are handled.

Thin client

In a client/server system, a thin client is a software application that requires nothing more than a browser and can be run only on the user’s computer (e.g., Microsoft Word). The terms “thin” and “thick” refer to the amount of code that must be run on the client computer. Thin clients are generally more secure than thick clients in the way encryption keys are handled.

Thrashing

A situation that occurs when paging on a virtual memory system is so frequent that little time is left for useful work.

Thread testing

It examines the execution time behavior of computer programs. A thread can be a sequence of programmer statements (source code) or machine instructions (object code). Petri nets can be used to analyze thread interactions. In the finite-state-machine (FSM) model, program paths are converted to threads.

Threat

An entity or event with the potential to harm a system. Threats are possible dangers to a computer system, which may result in the interception, alteration, obstruction, or destruction of computing resources, or in some other way disrupt the system. It is any circumstance or event with the potential to adversely impact organization operations (including mission, functions, image or reputation), organizational assets, individuals, and other organizations through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Threat is the potential for a threat-source to successfully exploit a particular information system’s vulnerability. It is an activity (deliberate or unintentional) with the potential for causing harm to an automated information system and a potential violation of system security. Threats arise from internal system failures, human errors, attacks, and natural catastrophes. Threats can be viewed in terms of categories and classes, as shown in the following table: Categories Classes Human categories Intentional or unintentional Environmental categories Natural or man-made (fabricated)

Threat agent/source

The intent and method targeted at the intentional exploitation of vulnerability or a situation and method that may accidentally trigger vulnerability. It is a method used to exploit vulnerability in a system, operation, or facility.

Threat analysis

The examination of threat-sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment. Threat is threat-source and vulnerability pair, which can be analyzed in parallel. However, threat analysis cannot be performed until after vulnerability analysis has been conducted because vulnerabilities lead to threats, which, in turn, lead to risks.

Threat assessment

A process of formally evaluating the degree of threat to an information system or enterprise and describing the nature of the threat.

Threat event

A catastrophic occurrence. Examples include fire, flood, power outage, and hardware/software failures.

Threat monitoring

The analysis, assessment, and review of audit trails and other data collected to search out system events that may constitute violations or attempted violations of system security.

Threat-source/agent

The intent and method targeted at the intentional exploitation of a vulnerability or a situation and method that may accidentally trigger a vulnerability. It is a method used to exploit vulnerability in a system, operation, or facility.

Threshold

A value that sets the limit between normal and abnormal behavior.

Ticket-oriented protection system

A computer protection system in which each subject maintains a list of unforgeable bit patterns, called tickets, one for each object the subject is authorized to access (e.g., Kerberos). Compare this with list-oriented protection system.

Tiger team

Conducts penetration testing to attempt a system break-in. It is an old name to discover system weaknesses and to recommend security controls. The new name is red team.

Timebomb

A variant of the Trojan horse in which malicious code is inserted to be triggered later at a particular time. It is a resident computer program that triggers an unauthorized act as a predefined time.

Time-dependent password

A password that is valid only at a certain time of the day or during a specified interval of time.

Time division multiple access (TDMA)

Form of multiple access where a single communication channel is shared by segmenting it by time. Each user is assigned a specific time slot. It is a technique to interweave multiple conversations into one transponder so as to appear to get simultaneous conversations.

Time-outs for inactivity

The setting of time limits for either specific activities or for nonactivity.

Time-stamping

The method of including an unforgeable time stamp with object structures, used for a variety of reasons such as sequence-numbering and expiration of data.

Time-to-exploitation

The elapsed time between the vulnerability is discovered and the time it is exploited.

Time-to-Live (TTL) hack

The Time-To-Live (TTL) hack or hop count prevents IP packets from circulating endlessly in the Internet.

Time-to-recover (TTR)

The time required for any computer resource to be recovered from disruptive events, specifically, the time required to reestablish an activity from an emergency or degraded mode to a normal mode. It is also defined as emergency response time (EMRT).

Timing attack

A side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Every logical operation in a computer takes time to execute, and the time can differ based on the input; with precise measurements of the time for each operation, an attacker can work backward to the input. Information can leak from a system through measurement of the time it takes to respond to certain queries. Timing attacks result from poor system/program design and implementation methods. Timing attacks and sidechannel attacks are useful in identifying or reverse-engineering a cryptographic algorithm used by some device. Other examples of timing attacks include (1) a clock drift attack where it can be used to build random number generators, (2) clock skew exploitation based on CPU heating, and (3) attackers who may find fixed Diffie-Hellman exponents and RSA keys to break cryptosystems (Wikipedia).