Time-based token (TOTP): A One-Time-Password that's rotated periodically
TKIP (Temporal Key Integrity Protocol): To address the shortcomings of WEP security
TLS 1.2: The current recommended revision of SSL
TLS 1.2 with AES GCM: A specific mode of operation for the AES block cipher that essentially turns it into a stream cipher
TLS Handshake: A mechanism to initially establish a channel for an application to communicate with a service
TPM (Trusted Platform Module):This is a hardware device that's typically integrated into the hardware of a computer, that's a dedicated crypto processor
Transport mode: One of the two modes of operations supported by IPsec. When used, only the payload of the IP packet is encrypted, leaving the IP headers untouched
Trojan: malware that disguises itself as one thing but does something else
Trusted execution environment (TEE): It provides a full-blown isolated execution environment that runs alongside the main OS
Tunnel: It is provided by L2TP, which permits the passing of unmodified packets from one network to another
Tunnel mode: One of the two modes of operations supported by IPsec. When used, the entire IP packet, header, payload, and all, is encrypted and encapsulated inside a new IP packet with new headers
U
Unbind:It closes the connection to the LDAP server
Username and password authentication: Can be used in conjunction with certificate authentication, providing additional layers of security
U2F (Universal 2nd Factor): It's a standard developed jointly by Google, Yubico and NXP Semiconductors that incorporates a challenge-response mechanism, along with public key cryptography to implement a more secure and more convenient second-factor authentication solution
V
Validity: This field contains two subfields, Not Before and Not After, which define the dates when the certificate is valid for