Мероприятия
SOC форум
DLTReg
CTCRYPT
КЗИ
PKI-Forum
НДО
X Уральский форум
Журнал
ТВ
Образование
Каталог
Издательство
Словарь
Словарь терминов по информационной безопасности
А
Б
В
Г
Д
Ж
З
И
К
Л
М
Н
О
П
Р
С
Т
У
Ф
Х
Ц
Ч
Ш
Э
Я
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
Z
T
Target of Evaluation (TOE)
Target of protection
Technical regulation
Telecommunication
Telecommunication facilities
Telecommunication system
Text block
Theoretical security
Threat
Threat
Threat management
Threat types
Threshold cryptographic scheme
Threshold secret sharing scheme
Time complexity
Timestamp
Timestamping authority
TOE resource
TOE security functions
TOE security functions interface
TOE security policy
TOE security policy model
TOR (The Onion Router)
Traffic
Traffic (flaw) confidentiality
Traffic analysis
Traffic padding
Transform free of error propagation
Transport layer cryptographic mechanisms
Trapdoor function
Trapdoor function generator
Trapdoor permutation family
Treat-risk model
Trojan
Trojan horse
Trojan horse
True random sequence
Trusted channel
Trusted computing base
Trusted Computing Base (TCB)
Trusted entity, trusted authority, authority, trusted third party
Trusted functionality
Trusted path
Tunnelling
Two-factor authentication
Two-party protocol