Security Technologies for the World Wide Web, Second Edition

T

TAZ network, 340, 364

Telnet, 55, 56, 66 “67, 155, 179, 335

Terminal access controller access control system, 67 “68

Thin client, 278

Threat, 9, 376

Threat analysis, 376 “77

Three-key triple data encryption standard, 95

Ticket cookie, 223

Ticket-granting server, 233 “37

Ticket-granting ticket, 234 “36, 240 “41

Time stamping authority, 195

Time-Stamp Protocol, 195

Timing attack, 9

Token bus, 118

Token encryption key, 165

Token Ring, 118

Tool control language, 301

Traffic analysis attack, 156, 319 “32

Traffic padding, 15

Transparent application gateway, 76

Transparent firewall, 66

Transport Control Protocol, 5, 54, 57 “58, 59, 62, 64, 300, 308

Transport Control Protocol connection flag, 55

Transport Control Protocol/Internet Protocol, 60, 71, 117

Transport Control Protocol SYN flooding, 3, 156

Transport layer interface, 143

Transport layer security, 244, 302, 310, 330, 337, 387

Transport Layer Security Protocol, 41, 143, 144, 146

certificates, 175 “78

Handshake Protocol, 171 “73

overview, 171 “75

Record Protocol, 171 “72

Transport Layer Security Working Group, 143, 171, 175

Transport mode, 132

Trapdoor, 287

Triple data encryption standard, 94 “95, 136, 174, 223

TRUSTe, 342

Trusted Computer Security Evaluation Criteria , 13

Trusted functionality, 15

Trusted root certificate, 177

Trusted sites zone, 289

Trusted third party, 98, 100, 186, 195, 215, 217, 233, 332

Trust management, 214, 214 “16

Trustmark, 342

Tunnel, 26

Tunneling Protocol, 119 “20, 122 “24, 127, 179 “81

Tunnel mode, 132, 133, 136

Two-key triple data encryption standard, 95

Категории