The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
cations, telephony, or stored computer data by an unauthorized party. See exceptional access.
THREATthe potential for exploitation of a vulnerability.
TOKENwhen used in the context of authentication, a (usually) physical device necessary for user identification.
TRAP AND TRACEa device that identifies the telephone numbers from which calls have been placed to a target telephone number.
TROJAN HORSEa computer program whose execution would result in undesired side effects, generally unanticipated by the user. A Trojan horse program may otherwise give the appearance of providing normal functionality.
TRUSTthe concept that a system will provide its intended functionality with a stated level of confidence. The term is also used for other entities, e.g., trusted software, trusted network, trusted individual. Sometimes the confidencealso called the assurancecan be measured, but sometimes it is inferred on the basis of testing and other information.
TRUSTWORTHINESSassurance that a system deserves to be trusted.
VULNERABILITYa weakness in a system that can be exploited to violate the system's intended behavior. There may be vulnerabilities in security, integrity, availability, and other aspects. The act of exploiting a vulnerability represents a threat, which has an associated risk of being exploited.
WORK FACTORa measure of the difficulty of undertaking a brute-force test of all possible keys against a given ciphertext and known algorithm.