АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ (information security) Treat-risk modelTarget of evaluation (TOE)Target of protectionTarget populationTargeted attackTargeted level of trustTechnical areaTechnical expertTechnical regulationTechnological certificateTechnology evaluationTelecommunicationTelecommunication facilityTelecommunication systemTelematics electronic messageTemporal metricsTest administratorTest data, evaluation dataTest observerTest organizationTest subjectTest сrewText blockTheoretical securityThird partyThird party of application serviceThird party who has special knowledgeThreatThreat huntingThreat intelligenceThreat intelligence platform (TIP)Threat managementThreat typesThreshold cryptographic schemeThreshold secret sharing schemeTime complexityTime stamping authorityTime-stamp tokenTimestampTimestamping authorityTOE resourceTOE security functionsTOE security functions interfaceTOE security policyTOE security policy modelToken endpointTop managementTOR (the onion router)TrafficTraffic (flaw) confidentialityTraffic analysisTraffic paddingTraffic protectionTrained modelTraining dataTransform free of error propagationTransmission security (TRANSEC)TransparencyTransport layer cryptographic mechanismTrapdoor functionTrapdoor function generatorTrapdoor hash functions (TDHF)Trapdoor permutation familyTreat descriptionTreat passportTrojanTrojan horseTrojan horseTrollTrollingTrue random sequenceTruepositive identification rate; TPIR; TPIR (N, R, T)Trusted channelTrusted computing baseTrusted computing base (TCB)Trusted entityTrusted entity, trusted authority, authority, trusted third party, trusted partyTrusted functionalityTrusted networkTrusted pathTrustscreenTrustworthinessTunnellingTweakable block cipher (TBC)Tweakable encryptionTwo-factor authenticationTwo-party protocol