Version 2.0

Cybersecurity Style Guide

T

tabletop exercise (n.)

A discussion-based exercise in which a team and a facilitator run through a hypothetical scenario to test an organization’s incident response. Sometimes informally abbreviated to TTX or TTE.

tailgating (n. or v.)

Entering a secure area by tagging along with someone who has proper credentials.

tail of the file (n.)

The last 10 lines of a file. It can be requested through the Unix command tail.

tailor (v.)

Also hone or refine, when referring to attacks or payloads.

taint (n.)

In Kubernetes and Terraform, a taint is a resource that is corrupt and needs some form of remediation. Explain on first use and use with caution.

take over (v.), takeover (n.)

Ex: An attacker could take over the system. The attack resulted in complete system takeover.

tar, .tar file

An archive utility or its filename extension.

Related:

tarball (n.)

A .tar file. Informal; do not use in formal writing.

TARDIS

Time And Relative Dimension In Space. The fictional police box-shaped spacecraft and time machine used in Doctor Who. It’s bigger on the inside.

tarpitting (n.)

The deliberate slowdown of a network to contain or deter an attack.

TASBot

Pronounced as “tass-bot.”

Tastic RFID Thief

A Bishop Fox tool that can copy RFID credentials up to three feet away.

TB (n.)

Terabyte. No space between the number and unit, as in “50TB.” Do not pluralize TB.

TCP/IP

Transmission Control Protocol/Internet Protocol. Wired Style calls it “the mother tongue of the internet.” Pronounced as letters. Do not spell out.

TED Talks or TEDx

Short for technology, entertainment, and design. Global knowledge conferences. Pronounced as “ted” and “ted-X.” Do not spell out.

TEE (n.)

Trusted Execution Environment. A secure area on a processor that is used to execute sensitive code.

teledildonics (n.)

Internet-enabled sex toys.

Telnet

A remote login protocol.

Related:

terminate (v.)

To end or close, as in a program.

Tesla

A manufacturing company named after the scientist Nikola Tesla.

Related:

text box (n.)

Related:

UI
TFS

Team Foundation Server. Spell out on first use.

Related:

tgrep

Pronounced as “T-grep.”

Related:

they

Use singular they. As with all language, be mindful of possible clarity issues.

thick client (n.)

A computer that provides rich functionality independent of the server. Also used to describe applications that run on a user’s machine and do not rely heavily on server communications. Also called a fat client; don’t use “fat client” in formal writing.

thin client (n.)

The opposite of a thick client. A computer that primarily depends on a server for computing within a larger infrastructure. Can refer to a web application.

third party (n.), third-party (adj.)

An external party (like a vendor) that exists outside of the company-user relationship.

THOTCON

An annual security conference in Chicago.

threat (n.)

Security threat categories include competitor, hacktivist, insider, dealer, nation-state, and third-party integrator.

threat hunting (n.)

Defensive security.

Related:

threat modeling (n.)

A process of identifying threats and relevant mitigations. This can vary from an informal phase of any assessment to a formal service that analyzes a given system.

The Three Laws of Robotics

Written by Isaac Asimov. “1: A robot may not injure a human being or, through inaction, allow a human being to come to harm. 2: A robot must obey orders given to it by human beings except where such orders would conflict with the First Law. 3: A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.”

throughput (n.)

The total amount of data transmitted over a link per unit of time.

Related:

throw, threw (v.), thrown (adj.)

When the code throws an error, it announces that something is wrong that the code cannot fix. Thrown errors can be ”caught“ by other portions of code.

Related:

Throwable

A Java class encompassing all errors and exceptions.

thumb drive (n.)

A small form-factor USB drive.

Related:

TikTok

Also known in China as Douyin (抖音).

tikzpeople (n.)

LaTeX emoji.

TIL

“Today I learned.” Pronounced as “till,” “teel,” the whole phrase, or as letters. Informal.

tilde (n.)

Tilde is the [ ~ ] character used in coding and in the Spanish letter ñ.

time-boxed (adj.)

Describes engagements that are limited by scoped hours.

Related:

time zone (n.)

Include the time zone if referring to a testing window or specific event. Avoid using military (24-hour) time unless relevant to the context.

Ex: EST, PDT, GMT

tip tinner (n.)

A solder cleaner.

Related:

titles of published works

Titles of books, movies, podcasts, TV shows, and video games do not often appear in our formal writing. When they do, we write them in title case, as in Snow Crash. If the title does not stand out on its own, add quotation marks, as in the dystopian novel “We” or the video game “E.T.”

TKIP

Temporal Key Integrity Protocol. An encryption protocol. Do not spell out.

TLA, TLAs (n.)

Three-letter agency. Refers to government agencies like the CIA, FBI, and NSA. Informal.

TLD, TLDs (n.)

Top-level domain. Pronounced as letters. Spell out on first use.

Related:

tl;dr or TL;DR

“Too long; didn’t read.” Pronounced as letters. Informal.

TLS

Transport Layer Security. The replacement for Secure Sockets Layer (SSL). Do not spell out unless defining the term.

TOCTOU bug (n.)

Time of check to time of use. A software issue that occurs between checking a condition and using the results of the check. Pronounced as “tock-too.”

Related:

TOFU (n.)

Trust on first use. An authentication scheme. Pronounced like tofu. Spell out on first use.

token (n.)

When discussing a type of token, use the normal style, as in “OAuth bearer token.” If it’s a specific token, use the tech font for its name, as in “oauth_token.”

toolkit (n.)

A set of software tools.

Tor

A privacy-focused web browser. Originally short for The Onion Router. Do not write as TOR. Do not spell out.

Torx

A hexalobular screwdriver head shape.

TOTP, TOTPs (n.)

Time-based One-time Password. An algorithm. Pronounced as letters. Spell out on first use.

Related:

tower defense (n.)

A genre of games in which the player builds defenses to survive wave after wave of enemy attackers.

T-POC (n.)

Technical point of contact. Pronounced as “tee-pock” or the whole phrase. Spell out on first use.

Related:

PoC
Transmetropolitan

A comic book series that follows the journalist Spider Jerusalem through a dystopian future city.

trapdoor (n.)

An undocumented way to access an application.

Related:

tribal knowledge (n.)

Do not use this term. Use institutional knowledge or in-house knowledge instead.

trick (v.)

OK in social engineering engagements. Also consider coerce, force, manipulate, or prompt.

Related:

Tripwire

A defensive security monitoring tool made by a company of the same name.

trivial (adj.)

If describing an easy-to-bypass security measure, choose a more descriptive word like insignificant, unsophisticated, or easily overcome. OK in the phrase “Although non-trivial to implement…”

trojan (n.)

Malware that masquerades as something legitimate.

troll (n. or v.), trolling (n.)

Hateful or intentionally ignorant behavior that intends to cause strong reactions and waste time. Don’t feed the trolls.

trophy (n.)

A prized target within an environment.

Related:

TruffleHog

An open source search tool.

truthiness (n.), truthy (adj.)

A property of data types whereby non-Boolean values can be evaluated as Booleans in some programming languages. For example, any non-empty string is considered True in Python.

try-catch block (n.)

An exception-handling strategy.

Related:

TSA

Transportation Security Administration.

TSP, TSPs (n.)

Telecommunications service provider or Telecommunications Service Priority, an FCC emergency program. Spell out on first use to clarify your intended meaning.

Related:

T-SQL

A SQL language extension. Pronounced as “tee-sequel.”

TTD (n.)

Time to detection. Pronounced as letters. Spell out on first use.

TTP, TTPs (n.)

Tactics, techniques, and procedures. Used during threat modeling exercises. Spell out on first use.

Related:

Tumblr

Related:

Turing test

A series of questions used to determine whether a subject is capable of human-like thinking.

Turla

A hacking group also known as Snake or Uroburos.

tvOS

Related:

iOS
TW, TWs (n.)

Trigger warning. Spell out on first use.

Related:

Twitch, twitch.tv

A livestreaming video platform.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.