Glossary

A B C D E F H I K L M N P R S T U V W Z
Two-Factor Authentication

Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are.

Trojan

A Trojan is also known as Trojan horse. It is a type of malicious software developed by hackers to disguise as legitimate software to gain access to target users systems.

Threat

A threat is a possible danger that might exploit a vulnerability to violate security protocols and thus, cause possible harm.

Tailgating

Tailgating involves someone who lacks the proper authentication following an employee into a restricted area.

Tablet

A tablet is a wireless, portable personal computer with a touchscreen interface.