Выбрать главу

Triangulation

Identifying the physical location of a detected threat against a wireless network by estimating the threat’s approximate distance from multiple wireless sensors by the strength of the threat’s signal received by each sensor, and then calculating the physical location at which the threat would be the estimated distance from each sensor.

Triple DES (3DES)

An implementation of the data encryption standard (DES) algorithm that uses three passes of the DES algorithm instead of one as used in ordinary DES applications. Triple DES provides much stronger encryption than ordinary DES but it is less secure than AES.

Tripwire

Tripwire, a network security tool, monitors the permissions and checksums of important system files to detect if they have been replaced or corrupted. Tripwire can be configured to send an alert to the administrator should any file’s recomputed checksum fail to match its baseline, indicating that the file has been altered.

Trojan horse (aka Trojan)

(1) A useful or seemingly useful program that contains hidden code of a malicious nature. When the program is invoked, so is the undesired function whose effects may not become immediately obvious. (2) It is a nonself-replicating program that appears to have a useful purpose, but actually has a hidden malicious purpose. The name stems from an ancient exploit of invaders gaining entry to the city of Troy by concealing themselves in the body of a hollow wooden horse, presumed to be left behind by the invaders as a gift to the city. (3) A computer program with an apparent or actual useful function that contains additional (hidden) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security or integrity. (4) It usually masquerades as a useful program that a user would wish to execute.

True negative

A tool reports a weakness when it is not present.

True positive

A tool reports a weakness when it is present.

Trust

(1) A characteristic of an entity (e.g., person, process, key, or algorithm) that indicates its ability to perform certain functions or services correctly, fairly, and impartially, and that the entity and its identity are genuine. (2) A relationship between two elements, a set of activities and a security policy in which element X trusts element Y if and only if X has confidence that Y will behave in a well-defined way (with respect to the activities) that does not violate the given security policy. (3) It is a belief that a system meets its specifications. (4) The willingness to take actions expecting beneficial outcomes based on assertions by other parties.

Trust anchor (public key)

(1) One or more trusted public keys that exist at the base of a tree of trust or as the strongest link on a chain of trust and upon which a public key infrastructure (PKI) is constructed. (2) A public key and the name of a certification authority (CA) that is used to validate the first certificate in a sequence of certificates. (3) The trust anchor public key is used to verify the signature on a certificate issued by a trust anchor CA. The security of the validation process depends upon the authenticity and integrity of the trust anchor. Trust anchors are often distributed as self-signed certificates.

Trust anchor (DNS)

A validating DNSSEC-aware resolver uses a public key or hash as a starting point for building the authentication chain to a signed domain name system (DNS) response. In general, a validating resolver will need to obtain the initial values of its trust anchors via some secure or trusted means outside the DNS protocol. The presence of a trust anchor also implies that the resolver should expect the zone to which the trust anchor points to be signed. This is sometimes referred to as a “secure entry point.”

Trust anchor store

The location where trust anchors are stored. Here, store refers to placing electronic data into a storage medium, which may be accessed and retrieved under normal operational circumstances by authorized entities.

Trust list

It is the collection of trusted certificates used by the relying parties to authenticate other certificates.

Trusted certificate

A certificate that is trusted by the relying party on the basis of secure and authenticated delivery. The public keys included in trusted certificates are used to start certification paths. It is also known as a trust anchor.

Trusted channel

(1) A mechanism by which two trusted partitions can communicate directly. (2) A trusted channel may be needed for the correct operation of other security mechanisms. (3) A trusted channel cannot be initiated by untrusted software and it maintains the integrity of information that is sent over it. (4) A channel where the endpoints are known and data integrity and/or data privacy is protected in transit using SSL, IPsec, and a secure physical connection. (5) A mechanism through which a cryptographic module provides a trusted, safe, and discrete communication pathway for sensitive security parameters (SSPs) and other critical information between the cryptographic module and the module’s intended communications endpoint. A trusted channel exhibits a verification component that the operator or module may use to confirm that the trusted channel exists. A trusted channel protects against eavesdropping, as well as physical or logical tampering by unwanted operators/entities, processes, or other devices, both within the module and along the module’s communication link with the intended endpoint (e.g., the trusted channel will not allow man-in-the-middle (MitM) or replay types of attacks). A trusted channel may be realized in one or more of the following ways: (i) A communication pathway between the cryptographic module and endpoints that are entirely local, directly attached to the cryptographic module, and has no intervening systems, and (ii) A mechanism that cryptographically protects SSPs during entry and output and does not allow misuse of any transitory SSPs.

Trusted computer system

(1) A system that employs sufficient hardware and software assurance measures to allow its use for processing simultaneously a range of sensitive or classified information. (2) A system believed to enforce a given set of attributes to a stated degree of assurance (confidence).

Trusted computing

Trusted computing helps network administrators to keep track of host computers on the network. This tracking and controlling mechanism ensures that all hosts are properly patched up, the software version is current, and that they are protected from malware exploitation. Trusted computing technologies are both hardware-based and software-based techniques to combat the threat of possible attacks. It includes three technologies such as trusted platform module, trusted network connect, and trusted computing software stack.

Trusted computing base (TCB)

The totality of protection mechanisms within a computer system, including hardware, firmware, and software, where this combination is responsible for enforcing a security policy. It provides a basic protection environment and provides additional user services required for a trusted computer system. The capability of a TCB to correctly enforce a security policy depends solely on the mechanisms within the TCB and on the correct input by system administrative personnel of parameters (e.g., a user’s clearance) related to the security policy.