Skip to main content
. 2 3 A B C D E F G H I J K L M N O P Q R S T U V W X Z

T

Tablets

A tablet is a portable computer that uses a touch screen as its primary input device. Most tablets are slightly smaller and weigh less than the average laptop.

Tax scam

Tax scam occurs when an individual or business entity wilfully and intentionally falsifies information on a tax return to limit the amount of tax liability.

TeamViewer

Team Viewer is a proprietary software application for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers.

Telecommunications

Telecommunications is the transfer of signals over long distances.

Telephone

A device that is used for point-to-point communication over a distance. This includes digital and IP telephony.

Telephone system

A system designed primarily for the transmission of voice communications.

Telerik

Telerik is a company offering software tools for web, mobile, desktop application development, tools and subscription services for cross platform application development.

Telewreck

Telewreck is a burp extension to detect and exploit versions of Telerik web UI vulnerable to CVE-2017-9248.

Telstra

Telstra is an Australian telecommunications company which builds and operates telecommunications networks and markets voice, mobile, internet access, pay television and other products and services.

TEMPEST

A short name referring to investigations and studies of compromising emanations.

TEMPEST-rated ICT equipment

ICT equipment that has been specifically designed to minimise TEMPEST emanations.

Text telephone or Telephone typewriter

A telephone typewriter is a telecommunication device that enables people who are deaf, hard of hearing or speech impaired to use the telephone system.

Threat actor

An entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact - an organisation's security. Also referred to as a malicious actor.

TLP

Traffic Light Protocol

TLP:WHITE

Not restricted. 
 
WHITE publications are not confidential. They contain information that is for public, unrestricted dissemination, publication, web-posting or broadcast. You may publish the information, subject to copyright and any restrictions or rights noted in the information.

TLS

Transport Layer Security

TOP SECRET area

An area that has been authorised to process, store or communicate TOP SECRET information. Such areas are not necessarily tied to a specific level of Security Zone.

Traffic flow filter

A device that has been configured to automatically filter and control the flow of data.

Traffic Light Protocol

The traffic light protocol is a set of designations used to ensure that sensitive information is shared with the correct audience.

Transfer Cross Domain Solution

A system that facilitates the transfer of information, in one or multiple directions (low to high or high to low), between different security domains.

Transport Layer Security

Transport layer security is a widely adopted security protocol designed to facilitate privacy and data security for communications over the internet.

Transport mode

An IPsec mode that provides a secure connection between two endpoints by encapsulating an IP payload.

Trend Micro

Trend Micro is a multinational cyber security and defence company with global headquarters in Tokyo, Japan. The company develops enterprise security software for servers, containers, and cloud computing environments, networks, and end points.

Trojan

A type of malware or virus disguised as legitimate software, which is used to hack into the victim's computer.

Trusted source

A person or system formally identified as being capable of reliably producing information meeting certain defined parameters, such as a maximum data classification and reliably reviewing information produced by others to confirm compliance with certain defined parameters.

TTY

Text telephone or Telephone typewriter

Tumblr

Tumblr is a free social networking website that allows registered users to post multimedia content to their own customizable blogs.

Tunnel mode

An IPsec mode that provides a secure connection between two endpoints by encapsulating an entire IP packet.

Twitter

Twitter is an American microblogging and social networking service on which users post and interact with messages known as "tweets".

Two-factor authentication

A form of multi-factor authentication (see definition) to confirm a user's claimed identity by combining two different pieces of evidence.