АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Target of evaluation (TOE)Target of protectionTargeted attackTechnical regulationTelecommunicationTelecommunication facilityTelecommunication systemTelematics electronic messageText blockTheoretical securityThreatThreat managementThreat typesThreshold cryptographic schemeThreshold secret sharing schemeTime complexityTimestampTimestamping authorityTOE resourceTOE security functionsTOE security functions interfaceTOE security policyTOE security policy modelTOR (the onion router)TrafficTraffic (flaw) confidentialityTraffic analysisTraffic paddingTransform free of error propagationTransmission security (TRANSEC)Transport layer cryptographic mechanismTrapdoor functionTrapdoor function generatorTrapdoor permutation familyTreat descriptionTreat passportTrojanTrojan horseTrojan horseTrollTrollingTrue random sequenceTrusted channelTrusted computing baseTrusted computing base (TCB)Trusted entity, trusted authority, authority, trusted third partyTrusted functionalityTrusted networkTrusted pathTrustscreenTunnellingTwo-factor authenticationTwo-party protocol