T (Security Glossary)

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

T=0 protocol

An asynchronous, character-oriented half-duplex transmission protocol.

T=1 protocol

An asynchronous, block-oriented half-duplex transmission protocol.

terminal

A combination of monitor, keyboard, mouse, and co-located peripherals, such as smart card readers. Multiple processes may be associated with a single terminal, but only one process controls the terminal at any given time.

three-phase key-exchange protocol

A protocol used to generate an authenticated and encrypted connection between two users on a nonsecure network. Users exchange a set of messages to negotiate a pair of encryption keys. One key is used by the sender to encrypt messages sent to the receiver and the other is used by the receiver to encrypt messages sent to the sender. This protocol ensures that both users are active and are sending messages directly to each other.

thumbprint

The SHA-1 hash of a certificate.

TLS

See Transport Layer Security protocol.

token

See access token.

transaction

An operation that allows you to perform multiple interactions as a single operation. Intermediate steps are not actually taken until all interactions are completed successfully. If any interaction fails, all steps are returned to their original setting.

transport layer

The network layer that is responsible for both quality of service and accurate delivery of information. Among the tasks performed in this layer are error detection and correction.

Transport Layer Security protocol

(TLS) A protocol that provides communications privacy and security between two applications communicating over a network.

triple DES

A variation of the DES block cipher algorithm that encrypts plain text with one key, encrypts the resulting ciphertext with a second key, and finally, encrypts the result of the second encryption with a third key. Triple DES is a symmetric algorithm that uses the same algorithm and keys for encryption and decryption.

trustee

The user account, group account, or logon session to which an access control entry (ACE) applies. Each ACE in an access control list (ACL) applies to one trustee.

See also access control entry and access control list.

trust list

See certificate trust list.

trust provider

The software that decides whether a given file is trusted. This decision is based on the certificate associated with the file.