Cybersecurity Glossary
1506 essential cybersecurity terms explained. Your reference guide from A to Z.
1506Terms
A–ZIndexed
T
TCP/IP
Transmission Control Protocol / Internet Protocol. The fundamental communication protocol suite of the internet that defines how data is packetized, addressed, transmitted, and received.
Traceroute
A network diagnostic tool that tracks the path packets take from source to destination, showing each hop and the time taken, useful for identifying network issues.
Trojan
Malware disguised as legitimate software that provides attackers with backdoor access to infected systems, often used to steal data or install additional malware.
Typosquatting
A form of cybersquatting where attackers register domain names similar to popular websites with common typos to capture traffic and distribute malware or steal credentials.
TOTP
Time-based One-Time Password. An algorithm that generates temporary passwords based on the current time and a shared secret, commonly used in authenticator apps.
Tailgating
A physical social engineering technique where an unauthorized person follows an authorized individual through a secure entrance without proper credentials.
Threat Hunting
The proactive search for cyber threats that have evaded existing security solutions, using hypotheses and advanced techniques to discover hidden compromises.
TTPs
Tactics, Techniques, and Procedures. The patterns of behavior and methods used by threat actors, documented in frameworks like MITRE ATT&CK for threat intelligence.
Threat Intelligence
Evidence-based knowledge about existing or emerging threats to an organization, including context about threat actors, their motivations, and attack methods.
Threat Actor
An individual, group, or entity responsible for cybersecurity incidents, ranging from script kiddies and hacktivists to organized crime and nation-states.
Threat Model
A structured approach to identifying, quantifying, and addressing security threats to a system, helping prioritize defensive measures based on risk.
Threat Landscape
The complete set of potential and identified cyberthreats affecting a particular sector, organization, or technology environment at a given time.
Tokenization
Replacing sensitive data with non-sensitive placeholder tokens that maintain the original data format while being meaningless if compromised.
TPM
Trusted Platform Module. A dedicated microcontroller designed to secure hardware through integrated cryptographic keys, used for disk encryption and secure boot.
Threat Modeling
A structured approach to identifying and prioritizing potential security threats during application design, enabling proactive mitigation of risks before deployment.
Tabletop Exercise
A discussion-based simulation where team members walk through a hypothetical security incident scenario to test response plans and identify gaps.
TryHackMe
A gamified cybersecurity training platform offering guided learning paths and hands-on virtual labs for beginners to advanced practitioners.
Telnet
An older network protocol for remote terminal access that transmits data in plaintext, making it inherently insecure and largely replaced by SSH.
Token Impersonation
A Windows attack technique where an attacker steals or duplicates access tokens of other users to impersonate them and access their resources.
Threat Intelligence Analyst
A cybersecurity professional who collects, analyzes, and disseminates information about current and emerging cyber threats to support defensive operations.
Traffic Analysis
The process of intercepting and examining network messages to deduce information from patterns in communication, even when messages are encrypted.
Template Injection
Server-Side Template Injection. A vulnerability where user input is embedded into server-side templates, potentially allowing remote code execution.
Tunneling
The practice of encapsulating one network protocol within another to create a secure communication path or bypass network restrictions.
TTP
Tactics, Techniques, and Procedures. The behavior patterns of threat actors that describe how they conduct attacks, used for threat intelligence and detection.
Timeline Analysis
A forensic technique that creates a chronological sequence of system events from multiple sources to reconstruct incident activities.
Triage
The initial assessment phase of incident response that quickly determines the scope, severity, and nature of a security incident.
Tapjacking
A mobile attack similar to clickjacking where malicious apps overlay transparent elements on legitimate apps to capture user taps.
Threat Hunter
A proactive cybersecurity role focused on searching through networks and systems to detect advanced threats that evade automated security controls.
TLS 1.3
The latest version of the Transport Layer Security protocol, providing improved security with reduced handshake latency and removal of obsolete algorithms.
TACACS+
Terminal Access Controller Access-Control System Plus. A protocol providing detailed access control for network equipment through separate authentication and authorization.
Time-Based SQL Injection
A blind SQL injection technique that infers information based on database response delays introduced by conditional time delay functions.
Triple Extortion
An evolution of double extortion where attackers additionally threaten DDoS attacks or contact the victim organization customers directly.
Twofish
A symmetric-key block cipher with a block size of 128 bits and key sizes up to 256 bits, a finalist in the AES selection process.
Triple DES
An encryption algorithm that applies the DES cipher three times to each data block, providing improved security over single DES.
Token Theft
The unauthorized acquisition of authentication tokens like session cookies, OAuth tokens, or Kerberos tickets to impersonate legitimate users.
Threat Intelligence Platform
A system that aggregates, correlates, and analyzes threat data from multiple sources to produce actionable intelligence.
Threat Containment
Immediate actions taken during incident response to prevent a threat from spreading, including network isolation and account lockdown.
TPM
Trusted Platform Module. A specialized chip on a computer motherboard that stores cryptographic keys and provides hardware-based security functions.
Thunderbolt Attack
Attacks exploiting the direct memory access capabilities of Thunderbolt ports to read or write system memory.
Training Data Extraction
Attacks that recover private training data from machine learning models through inference queries and memorization exploitation.
TDE
Transparent Data Encryption. A technology that encrypts database files at rest without requiring changes to applications accessing the data.
TEMPEST
A US government codename for standards and measures protecting against compromising electromagnetic emanations from electronic equipment.
Tor Network
The Onion Router. An anonymity network that encrypts traffic and routes it through multiple volunteer relays to conceal user identity and location.
Traffic Shaping
The deliberate manipulation of network traffic to optimize performance, enforce policies, or detect anomalies.
TAXII
Trusted Automated eXchange of Indicator Information. A protocol for exchanging cyber threat intelligence in STIX format between organizations.
The Sleuth Kit
An open-source collection of command-line tools for digital forensics, providing disk image analysis and file system examination.
Threat Modeling Tool
Software that assists in identifying, categorizing, and prioritizing potential security threats during application design.
Tabletop Scenario
A structured discussion exercise where participants walk through a hypothetical security incident to test response plans.
TCP Reset Attack
An attack that terminates established TCP connections by sending forged RST packets, disrupting communications between legitimate parties.
Traffic Mirroring
Copying network traffic to a monitoring port or tool for analysis without affecting the original traffic flow.
Teardrop Attack
A denial-of-service attack that sends fragmented IP packets with overlapping offset fields, crashing vulnerable systems during reassembly.
Tabnabbing
A phishing attack where a background browser tab changes its content to a login page, tricking users into entering credentials.
Threat-Led Penetration Testing
Testing based on threat intelligence about adversaries likely to target the organization, simulating their specific techniques.
TIBER-EU
Threat Intelligence-Based Ethical Red Teaming. A European framework for testing financial institutions using intelligence-led red team exercises.
Thick Client Testing
Security assessment of desktop applications that process data locally, including memory analysis, DLL hijacking, and local storage review.
Threshold Cryptography
A cryptographic system where multiple parties must cooperate to perform cryptographic operations, preventing single points of compromise.
Threat Feed
An automated stream of threat intelligence data including indicators of compromise, malware signatures, and vulnerability information.
Tier 1 SOC Analyst
An entry-level security analyst responsible for initial alert triage, monitoring dashboards, and escalating confirmed threats.
Tier 2 SOC Analyst
A mid-level security analyst who performs deeper investigation of escalated incidents, conducts forensic analysis, and develops detection rules.
Tier 3 SOC Analyst
A senior security analyst specializing in advanced threat hunting, malware analysis, and complex incident investigation.
Threat Intelligence Lifecycle
The cyclical process of planning, collecting, processing, analyzing, disseminating, and evaluating threat intelligence.
Third-Party Risk Policy
A policy establishing requirements for assessing and managing cybersecurity risks from vendors and business partners.
Transfer Learning Attack
Exploiting the shared knowledge in pre-trained models to craft adversarial examples that transfer across different AI systems.
Tailgating Prevention
Physical security measures including mantraps, turnstiles, and guard stations designed to prevent unauthorized following through secured doors.
Threat Intelligence Career
A career path focused on collecting, analyzing, and disseminating intelligence about cyber threats and threat actors.
Threat Landscape Report
A periodic assessment documenting current and emerging cyber threats, attack trends, and their potential impact on organizations.
Threat Hunting Hypothesis
A proposed theory about adversary activity that guides proactive searches through network and endpoint data for evidence of threats.
Threat Profile
A detailed characterization of a threat actor including their capabilities, motivations, targets, and typical attack patterns.