Letter archive

T Terms — Election Security Glossary

233 election security terms starting with T, with direct links to full definitions and source-backed context.

T 233 terms
T-Coil
Auditing
Inductive coil used in some hearing aids to allow reception of an audio band magnetic field signal, instead of an acoustic signal. The magnetic or inductive mode of reception is commonly used in conju…
Full definition →
TAXII (trusted Automated Exchange of Indicator Info)
Cybersecurity
TAXII is not an information sharing program and does not define trust agreements. Rather, it is a set of specifications for exchanging cyberthreat information to help organizations share information w…
Full definition →
TLS (transport Layer Security)
Infrastructure
TLS refers to another cryptographic protocol designed for the purpose of providing security and confidentiality of information transmitted over the Internet. It was based on SSL, which it is meant to …
Full definition →
TMI
Election Administration
A set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience.
Full definition →
TOE Security Functions (TSF)
Legal & Policy
Set consisting of all hardware, software, and firmware of the TOE that must be relied upon for the correct enforcement of the TOE Security Policy (TSP). (CNSSI-4009) (NISTIR)
Full definition →
TOE Security Policy (TSP)
Legal & Policy
Set of rules that regulate how assets are managed, protected, and distributed within the TOE. SOURCE: CNSSI-4009
Full definition →
TRANS
Infrastructure
A software product of Hart Intercivic used to provide audio information for assistive ballots. An acronym for Translation Recording and Normalization Software.
Full definition →
TRB
Cybersecurity
A type of malware that conceals its true content to fool a user into thinking it's a harmless file
Full definition →
TSA
Cybersecurity
A form of cybersquatting (sitting on sites under someone else's brand or copyright) that targets Internet users who incorrectly type a website address into their web browser
Full definition →
TSEC
Election Administration
Telecommunications Security. (CNSSI-4009) (NISTIR)
Full definition →
TSEC Nomenclature
Infrastructure
The NSA system for identifying the type and purpose of certain items of COMSEC material.
Full definition →
Tab
Election Administration
Tabulation
Full definition →
Tabletop Exercise
Incident Response
A discussion-based drill where qualified personnel discuss scenarios and responses in order to validate plans and procedures. Also called Incident Response Planning or TTX.
Full definition →
Tabulate
Tabulation
also: count
Process of totaling votes.
Full definition →
Tabulating Equipment
Tabulation
The hardware, software, or supplies used to count votes.
Full definition →
Tabulating Equipment Memory Card
Tabulation
An electronic data storage device used for storing digital vote totaling information, typically using flash memory.
Full definition →
Tabulation
Tabulation
Process of totaling votes.
voting
Full definition →
Tabulation Audit
Tabulation
A post-election audit that involves hand-counting a sample of votes on paper records, then comparing those counts to the corresponding vote totals originally reported as a check on the accuracy of ele…
Full definition →
Tabulation Board
Election Administration
A board whose responsibility is “to handle and pr ocess all ballots delivered to the computer area” for counting. Mont. Admin. Rules §44.3.1769. Cf. STAGING BOARD.
Full definition →
Tabulation Memory Device
Infrastructure
A term that is used, but not defined, in the West Virginia Code: “The ‘tabulation memory device’ may be removed from the ballot-scanning device only after the polls close and the votes may only be cou…
Full definition →
Tabulation Report
Results & Reporting
A report containing the counts associated with ballots tabulated for a given election district.
Full definition →
Tabulation Supervisor
Election Administration
The person “in charge of the operation of the automatic tabulating equipment at the
Full definition →
Tabulator
Voting Systems
The person or device that counts votes.
voting
Full definition →
Tabulator Summary Count Record
Auditing
A record that must be produced by each TABULATOR for purposes of AUDIT. Its detailed contents are specified in the 2007 VVSG, but fundamentally it ties the tabulator’s unique device identifier to vari…
Full definition →
Tactical Data
Election Administration
Information that requires protection from disclosure and modification for a limited duration as determined by the originator or information owner.
Full definition →
Tactical Edge
Infrastructure
The platforms, sites, and personnel (U. S. military, allied, coalition partners, first responders) operating at lethal risk in a battle space or crisis environment characterized by 1) a dependence on …
Full definition →
Tactical Voting
Election Administration
Strategic VOTING
Full definition →
Tactile Controls
Election Administration
Controls that are discernable or perceptible by touch using hands, feet, or other parts of the body. (Does not include touch screens.) Dual switches are a form of tactile controls that can be used by …
Full definition →
Tactile Discernible Controls
Election Administration
Voting machine controls capable of being det ected and manipulated through the use of touch alone.
Full definition →
Tactile Input
Legal & Policy
A method by which a visually impaired voter may interact with a voting machine. Fla. Stat. 101.56062(1)(a).
Full definition →
Tailored Security Control Baseline
Infrastructure
A set of security controls resulting from the application of tailoring guidance to the security control baseline. See Tailoring. (SP 800-37; SP 800-53; SP 800-53A) (NISTIR)
Full definition →
Tailored Trustworthy Space
Cybersecurity
A cyberspace environment that provides a user with confidence in its security, using automated mechanisms to ascertain security conditions and adjust the level of security based on the user's con…
Full definition →
Tailoring (assessment Procedures)
Infrastructure
The process by which a security control baseline is modified based on (i) the application of scoping guidance, (ii) the specification of compensating security controls, if needed, and (iii) the specif…
Full definition →
Take-home
Infrastructure
A type of VVPAT system in which the paper ballot ma y be taken from the polling place by the voter. In some, such as AccuPoll, it is not intended that the ballot be removed. In others, such as VoteHer…
Full definition →
Tally
Operational Security
Process of totaling votes.
Full definition →
Tally Board
Election Administration
A body that retains custody of VOTED BALLOTS after they are cast. Ariz. Rev. Stat. §16-531.
Full definition →
Tally Book
Election Administration
TALLY LIST, def. 1. Nev. Rev. Stat. §293.113.
Full definition →
Tally List
Auditing
1. A document prepared by the TALLY BOARD certifying the number of votes cast for each office and on each measure. Ariz. Rev. Stat. §16-604(B). 2. A document prepared by a COUNTING TEAM during a RECOU…
Full definition →
Tally Person
Auditing
In Vermont, an election worker who has a specialized role in a RECOUNT. “The tally person and the DOUBLE-CHECK PERSON or persons each shall make a suitable mark for that candidate and/or BLANK BALLOTS…
Full definition →
Tally Sheet
Tabulation
The paper form or electronic record used to collect data in the process of counting votes.
Full definition →
Tampering
Legal & Policy
An intentional but unauthorized act resulting in the modification of a system, components of systems, its intended behavior, or data.
Full definition →
Tape
Results & Reporting
Report run from a vote tabulation device to show the total number of votes cast per candidate or issue.
Full definition →
Target
Election Administration
The area on a ballot in which a voter indicates a selection. Also TARGET AREA.
Full definition →
Target Area
Election Administration
The area on a PAPER BALLOT that the voter is supposed to mark in order to cast a vote. The “square next to the candidate’s name or issue on the PAPER BALLOT, the oval next to the candidate’s name or i…
Full definition →
Target of Evaluation (TOE)
Infrastructure
In accordance with Common Criteria, an information system, part of a system or product, and all associated documentation, that is the subject of a security evaluation.
Full definition →
Targeted/targeting
Cybersecurity
A cyber actor’s targeting of a particular victim can refer to any aspect of the actor’s attempts to select a system to conduct operations against, learn about, find vulnerabilities, gain access, or co…
Full definition →
Targets
Cybersecurity
In the NICE Framework, cybersecurity work where a person: Applies current knowledge of one or more regions, countries, non-state entities, and/or technologies.
Full definition →
Technical
Infrastructure
Data Package (TDP) A collection of documents that describe a voting system, including manuals, description of components and details of architectural and engineering design.
Full definition →
Technical Community (TC)
Legal & Policy
Government/Industry/Academia partnerships formed around major technology areas to act like a standards body for the purpose of creating and maintaining Protection Profiles.
Full definition →
Technical Controls
Infrastructure
T he security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardwar…
Full definition →
Technical Data Package
Supply Chain
also: TDP
Vendor documentation relating to the voting system required to be submitted with the system as a precondition of certification testing.
testingvoting
Full definition →
Technical Guidelines Development Committee (tgdc)
Infrastructure
also: TGDC
A committee of election officials, computer scientists, and other experts that assists the EAC in developing the Voluntary Voting System Guidelines (VVSG). The chairperson of the TGDC is the director …
Full definition →
Technical Non-repudiation
Election Administration
The contribution of public key mechanisms to the provision of technical evidence supporting a non-repudiation security service. (SP 800-32) (NISTIR)
Full definition →
Technical Reference Model (TRM)
Election Administration
A component-driven, technical framework that categorizes the standards and technologies to support and enable the delivery of service components and capabilities.
Full definition →
Technical Security Controls
Infrastructure
Security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, so…
Full definition →
Technical Security Material
Cybersecurity
Equipment, components, devices, and associated documentation or other media which pertain to cryptography, or to the security of telecommunications and information systems.
Full definition →
Technical Surveillance Countermeasures (tscm)
Election Administration
Techniques to detect, neutralize, and exploit technical surveillance technologies and hazards that permit the unauthorized access to or removal of information.
Full definition →
Technical Vulnerability Information
Election Administration
Detailed description of a weakness to include the implementable steps (such as code) necessary to exploit that weakness.
Full definition →
Technology Research and Development
Cybersecurity
In the NICE Framework, cybersecurity work where a person: Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility.
Full definition →
Telecommunications
Election Administration
Transmission, between or among points specified by the user, of information of the user's choosing, without change in the form or content of the information as sent and received.
it
Full definition →
Telecommunications Security
Infrastructure
(TSEC) nomenclature The National Security Agency (NSA) system for identifying the type and purpose of certain items of COMSEC material.
Full definition →
Telework
Election Administration
The ability for an organization’s employees and contractors to perform work from locations other than the organization’s facilities. (SP 800-46) (NISTIR)
Full definition →
Tempest
Infrastructure
A name referring to the investigation, study, and control of unintention al compromising emanations from telecommunications and automated information systems equipment.
Full definition →
Tempest Test
Infrastructure
Laboratory or on-site test to determine the nature of compromising emanations associated with an information system. (CNSSI-4009) (NISTIR)
Full definition →
Tempest Zone
Election Administration
Designated area within a facility where equipment with appropriate TEMPEST characteristics (TEMPEST zone assignment) may be operated.
Full definition →
Template
Election Administration
1. A “piece of material containing precisely lo cated holes, conical in shape and positioned so that a stylus tip can penetrate only the scored areas of the BALLOT CARD.” 31 Ky. Admin. Regs. §2:010(1)…
Full definition →
Temporalballotrequest
Election Administration
Used in request messages. Subtype of BallotRequest in which election opportunities that the voter is qualified during a given time frame may be requested. Attribute Multiplicity Type Attribute Descrip…
Full definition →
Temporary Registration
Election Administration
A registration to vote issued to voters who have moved overseas under certain conditions. Va. Code §24.2-443.1.
Full definition →
Term Limits
Legal & Policy
A legal restriction that limits the total number of terms an officeholder may serve in a particular elected office.
Full definition →
Term of Office
Election Administration
The period of time for which a person is elected or appointed to hold a public office. Terms of elected office are usually 2, 4 or 6 years.
Full definition →
Termination of Voting
Election Administration
The following provision is typical: “A person who is in line to vote when the polls close on election day shall be allowed to vote. Voting in a primary or general election shall terminate (1) when the…
Full definition →
Test
Operational Security
Procedure used to determine one or more characteristics of a given product, process, or service according to a specified procedure for conformity assessment. A test may be an operational test or a non…
testing
Full definition →
Test Ballot
Infrastructure
A BALLOT prepared to test a voting machine or system. Texas Elec. Code §127.094(c).
Full definition →
Test Campaign
Certification
Sum of the work by a voting system test lab on a single product or system from contract through test plan, conduct of testing for each requirement (including hardware, software, and systems), reportin…
Full definition →
Test Cards
Auditing
A “preaudited group of ballot cards on which are recorded a predetermined number of valid votes for each candidate and on each measure and shall include for each office one (1) or more ballots which c…
Full definition →
Test Case Specification
Election Administration
also: Test Case Specification
Document identifying the specific inputs and expected result for each test identified in the test plan.
testing
Full definition →
Test Deck
Verification
A set of marked ballots with a predetermined outcome. Used for logic and accuracy testing of a voting system.
Full definition →
Test Design Specification
Election Administration
Expanded detail of the test approach identified in the test plan for the related tests.
testing
Full definition →
Test Key
Infrastructure
Key intended for testing of COMSEC equipment or systems. If intended for off-the-air, in-shop use, such key is called maintenance key.
Full definition →
Test Lab
Infrastructure
VOTING SYSTEM Testing Laboratory. 2007 VVSG
Full definition →
Test Method
Operational Security
Specified technical procedure for performing a test, procedures by which tests are derived, or a combination of these.
testingconformity assessment
Full definition →
Test Plan
Election Administration
Document created prior to testing that outlines the scope and nature of testing, items to be tested, test approach, resources needed to perform testing, test tasks, risks, and schedule.
testingconformity assessment
Full definition →
Test Report for EAC Certification
Infrastructure
A “report of results of independent testing of a voting system indicating the data testing was completed, the specific system version te sted, and the scope of tests conducted.” 2005 VVSG V.1, APPENDI…
Full definition →
Test Suite
Voting
Implementation of a set of operational tests for a particular object (such as a specific voting system) or class of objects (such as all voting systems that can interpret the language in which the tes…
Full definition →
Test and Evaluation
Cybersecurity
In the NICE Framework, cybersecurity work where a person: Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost…
Full definition →
Testing
Compliance
Determination of one or more characteristics of an object of conformity assessment, according to a procedure. Testing typically applies to materials, products, or processes.
testingconformity assessment
Full definition →
Testing Authority
Certification
Organization that performs qualification testing and produces qualification test reports. See also Voting System Testing Laboratory.
testingconformity assessment
Full definition →
Testing Board
Election Administration
A body that conducts a public test of election e quipment. The “designated election official shall select a testing board comprising at l east two persons, one from each major political party.” Col. C…
Full definition →
Testing Laboratories
Operational Security
The process of performing any tests or procedures that are conducted in a controlled environment where the appropriate equipment, supplies, and certified expertise are available. Laboratory testing ca…
Full definition →
Testing Standard
Standards
Standard that is concerned with test methods, sometimes supplemented with other provisions related to testing, such as sampling, use of statistical methods or sequence of tests.
Full definition →
Text-to-speech
Election Administration
A technology that converts textual material in electronic form to spoken audio output, suitable for use by a visually impaired voter.
Full definition →
That Not Every
Legal & Policy
ELIGIBLE VOTER is a “legal voter.”
Full definition →
Third Party
Election Administration
A person or group besides the two primarily involved in a situation.
Full definition →
Third Party Auditor
Access Control
A certified or otherwise credentialed individual or group, other than an election official, who is tasked with reviewing election materials.
Full definition →
Third Party Candidate
Registration
A candidate seeking nomination for office, with a political party affiliation other than the two majority political parties (Republican and Democratic).
Full definition →
Third Party Logic
Software
Software, firmware, or hardwired logic that is neither application logic nor COTS. This includes, for example, general-purpose software developed by a third party that is either customized (for exampl…
Full definition →
Third Party Notification
Election Administration
A notification from a person or group besides the two primarily involved in a transaction. An example is a change of address notification from the US Postal Service forwarded to an elections office.
Full definition →
This Instruction Applies to All
Infrastructure
U. S. Government Departments, Agencies, Bureaus and Offices; supporting contractors and agents; that collect, generate process, store, display, transmit or receive classified or controlled unclassifie…
Full definition →
Threat
Legal & Policy
Any circumstance or event with the potential to adversely impact organizational operations, (including mission, functions, image, or reputation), organizational assets, individuals, other organization…
Full definition →
Threat Actor
Uncategorized
also: Threat Agent
An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Full definition →
Threat Analysis
Election Administration
See threat assessment.
Full definition →
Threat Assessment
Infrastructure
Process of formally evaluating the degree of threat to an information system or enterprise and describing the nature of the threat.
Full definition →
Threat Event
Election Administration
An event or situation that has the potential for causing undesirable consequences or impact. (SP 800-30) (NISTIR)
Full definition →
Threat Monitoring
Auditing
Analysis, assessment, and review of audit trails and other information collected for the purpose of searching out system events that may constitute violations of system security.
Full definition →
Threat Scenario
Election Administration
A set of discrete threat events, associated with a specific threat source or multiple threat sources, partially ordered in time. (SP 800-30) (NISTIR)
Full definition →
Threat Shifting
Election Administration
Response from adversaries to perceived safeguards and/or countermeasures (i.e., security controls), in which the adversaries change some characteristic of their intent to do harm in order to avoid and…
Full definition →
Threat Source
Election Administration
The intent and method targeted at the intentional exploitation of a vulnerability or a situation and method that may accidentally exploit a vulnerability.
Full definition →
Threatscape
Cybersecurity
The spectrum of possible cybersecurity threats
Full definition →
Threatware
Infrastructure
A general term encompassing all types of malicious software on computers and electronic devices
Full definition →
Threshold
Legal & Policy
The minimum level of support which a party needs to gain representation in the legislature. A threshold may be a formal threshold, which is a figure laid down in the constitution or the law, usually i…
Full definition →
Threshold Cryptography
Cybersecurity
A form of cryptography useful in secure verifi able voting schemes to prevent malfeasance by requiring multiple parties in order to decrypt a message so that decryption cannot be accomplished by any s…
Full definition →
Ticket
Election Administration
Another name for a ballot.
Full definition →
Tie Vote
Voting
An equal number of votes for more than one candidate or issue of the same contest.
Full definition →
Tier
Infrastructure
3 (COMSEC) The lowest tier or layer of electronic key management system (EKMS) architecture comprising hand-receipt holders who use an electronic fill device (e.g., the Data Transfer Device (DTD), Sec…
Full definition →
Time
Election Administration
Most states limit the time an individual voter may take to cast a vote. “No voter shall remain in the voting machine booth longer than two minutes, and having cast his vote the voter shall at once eme…
Full definition →
Time Bomb
Legal & Policy
Resident computer program that triggers an unauthorized act at a predefined time.
Full definition →
Time Limit
Election Administration
An amount of time in which something must be done or completed.
Full definition →
Time Off for Voting
Voting
Almost every state prohibits employers from disciplining or firing an employee who takes time off work to vote. Some state laws require employers to give their employees a specific amount of time off …
Full definition →
Time of Recall
Legal & Policy
The legal time period for the process by which citizens can remove elected officials from office before their term is completed.
Full definition →
Time-compliance Date
Election Administration
Date by which a mandatory modification to a COMSEC end-item must be incorporated if the item is to remain approved for operational use.
Full definition →
Time-dependent Password
Election Administration
Password that is valid only at a certain time of day or during a specified interval of time.
Full definition →
Time-sensitive Code
Infrastructure
Software whose behavior changes based on readi ng a real-time clock. For example, a system might be programmed to read the clock to determine whether the official election is in progress and use that …
Full definition →
Timestamp
Infrastructure
A string indicative of clock or elapsed time, ge nerally consisting of day, month, year and time of day. The modern trend is to require a PROGRAMMED DEVICE to have an onboard clock so that timestamps …
Full definition →
Timestomping
Cybersecurity
A technique used in cybersecurity and digital forensics, where attackers modify the timestamps of files and directories on a computer system to hide their actions or impede investigations
Full definition →
Timing
Infrastructure
A USABILITY issue identified as a HUMAN FACTOR in the 2007 VVSG. A voting device must respond sufficiently rapidly to voter input to maintain the cognitive pace of a VOTING SESSION. See also ALERT TIM…
Full definition →
Timing Mark
Election Administration
A printed mark, general at the edge of an optical scan ballot to indicate the vertical location of VOTING POSITIONS. Improperly printed timing marks can lead to a ballot being read incorrectly or not …
Full definition →
Timing Track
Election Administration
A column of rectangular marks on an optical scan ballot used to indicate the horizontal position of CANDIDATE OVALS. See also CODE CHANNEL.
Full definition →
Tint
Election Administration
A “color and design prescribed by the Secretary of State which is printed on card stock for ballots to be used in California elections. Bo th color and design will be prescribed by the Secretary of St…
Full definition →
Title
Infrastructure
The title of a MEASURE. A “brief statement that fairly and accurately represents the true intent and meaning of the proposed text of the initiative.” Col. Stat. §1-40-102(10). Title I Funds Funds in t…
Full definition →
Token
Cybersecurity
also: authentication token
Something a user possesses and controls, typically a key or password, that is used to authenticate an identity.
Full definition →
Tools for Ballot-polling Risk-limiting Election Audits
Auditing
A freely public and available web-based tool to conduct ballot-polling risk-limiting audits.
Full definition →
Total Completion Score
Infrastructure
A “ BENCHMARK used in the VPP. The proportion of users who successfully cast a ballot (whether or not the ballot contains erroneous votes). Failure to cast a ballot might involve problems such as a vo…
Full definition →
Total Risk
Infrastructure
The potential for the occurrence of an adverse event if no mitigating action is taken (i.e., the potential for any applicable threat to exploit a system vulnerability). (SP 800-16) (NISTIR)
Full definition →
Touch Screen
Voting Systems
A display device which allows the user to interact with a computer by touching areas on the screen.
Full definition →
Touch Screen Voting Machine
Voters
Machine that utilizes a computer screen whereby a voter executes that voter’s choices by touching designated locations on the screen and that then tabulates those choices.
voting
Full definition →
Touch Screen Voting Machines
Election Administration
These are a type of Direct Recording Electronic (DRE) voting machine in which the voter makes selections on her ballot by touching specified areas on an electronic display screen.
Full definition →
Touchscreen Voting
Voting
Voting using a machine that utilizes a computer screen to display the ballot and allows the voter to indicate his or her selections by touching designated locations on the screen.
Full definition →
Touchscreen Voting Machine
Voting
A voting machine that utilizes a computer screen to display the ballot and allows the voter to indicate his or her selections by touching designated locations on the screen.
Full definition →
Touchscreen Voting System
Voting
A voting system that utilizes machines with a computer screen to display the ballot and allows the voter to indicate his or her selections by touching designated locations on the screen.
Full definition →
Town
Election Administration
A civil and political subdivision of a state, which varies in size and significance according to location but is ordinarily a division of a county. A town may or may not have a local government.
Full definition →
Town Clerk
Personnel
A town official who is responsible for election administration for a town.
Full definition →
Town Council
Governance
The governing body of a town in many U. S. states, consisting of members elected by the voters.
Full definition →
Town Election
Election Administration
An “election to choose a town officer.” 63 N. H. Rev. Stat. §652:7.
Full definition →
Township
Election Administration
also: civil township
A widely used unit of local government in the United States, subordinate to a county, with some form of local government for which it generally conducts elections.
Full definition →
Township Clerk
Personnel
A township official who is responsible for election administration for a township.
Full definition →
Township Office
Election Administration
An “office filled by a township officer.” Nev. Rev. Stat. §293.115.
Full definition →
Township Officer
Election Administration
A “public official elected in a township to serve the township.” Nev. Rev. Stat. §293.117.
Full definition →
Traceability
Standards
Ability to relate a property of the result of a measurement or the value of a standard to stated references.
testing
Full definition →
Tracking Cookie
Election Administration
A cookie placed on a user’s computer to track the user’s activity on different Web sites, creating a detailed profile of the user’s behavior. (SP 800-83) (NISTIR)
Full definition →
Tracking Number
Infrastructure
A number, required in Ohio, to be printed on each ballot of a BALLOTS ON DEMAND VOTING SYSTEM. Ohio Rev. Stat. §3506.20(B).
Full definition →
Tradecraft Identity
Election Administration
An identity used for the purpose of work-related interactions that may or may not be synonymous with an individual’s true identity.
Full definition →
Traditional Infosec Program
Election Administration
Program in which NSA acts as the central procurement agency for the development and, in some cases, the production of INFOSEC items. This includes the Authorized Vendor Program. Modifications to the I…
Full definition →
Traditional Key
Cybersecurity
Term used to reference symmetric key wherein both ends of a link or all parties in a cryptonet have the same exact key. 256-bit advanced encryption standard (AES), high assurance internet protocol enc…
Full definition →
Traditional Voting
Election Administration
Voting channels currently used for B. C. local or provincial government elections; e.g., in-person, absentee, vote by mail.
Full definition →
Traffic Analysis
Cybersecurity
(TA) Gaining knowledge of information by inference from observable characteristics of a data flow, even if the information is not directly available (e.g., when the data is encrypted). These character…
Full definition →
Traffic Encryption Key (TEK)
Cybersecurity
Key used to encrypt plain text or to superencrypt previously encrypted text and/or to decrypt cipher text.
Full definition →
Traffic Flow Security (TFS)
Election Administration
Techniques to counter Traffic Analysis.
Full definition →
Traffic Light Protocol
Election Administration
A set of designations employing four colors (RED, AMBER, GREEN, and WHITE) used to ensure that sensitive information is shared with the correct audience. (Adapted from: US-CERT) (NICCS)
Full definition →
Traffic Padding
Election Administration
The generation of spurious instances of communication, spurious data units, and/or spurious data within data units.
Full definition →
Training (information Security)
Election Administration
Training strives to produce relevant and needed (information) security skills and competencies. (SP 800-50) (NISTIR)
Full definition →
Training Assessment
Election Administration
An evaluation of the training efforts. (SP 800-16) (NISTIR)
Full definition →
Training Effectiveness
Election Administration
A measurement of what a given student has learned from a specific course or training event. (SP 800-16) (NISTIR)
Full definition →
Training Effectiveness Evaluation
Election Administration
Information collected to assist employees and their supervisors in assessing individual students’ subsequent on-the-job performance, to provide trend data to assist trainers in improving both learning…
Full definition →
Training Key
Election Administration
Key intended for use for over-the-air or off-the-air training.
Full definition →
Tranquility
Infrastructure
Property whereby the security level of an object cannot change while the object is being processed by an information system.
Full definition →
Transfer Case
Election Administration
The “sealed box used to transport voted ballots to the counting center.” Utah Code §20A-1- 102(75). A “container, prescribed by the Secret ary of the State Electi on Board, which can be closed and sea…
Full definition →
Transfer Cross Domain Solution
Infrastructure
A type of cross domain solution (CDS) that facilitates the movement of data between information systems operating in different security domains.
Full definition →
Transfer Key Encryption Key (trkek)
Cybersecurity
A key used to move key from a Key Processor to a data transfer device (DTD)/secure DTD2000 system (SDS)/simple key loader (SKL).
Full definition →
Transfer of Accountability
Election Administration
The process of transferring accountability for COMSEC material from the COMSEC account of the shipping organization to the COMSEC account of the receiving organization.
Full definition →
Transitive RLA
Auditing
An RLA in which the ballots are retabulated, obtaining a Cast Vote Record for each ballot sheet, and the audit uses these new Cast Vote Records instead of data from the original tabulation. If the ret…
Full definition →
Translate
Election Administration
Express the sense of (words or text) in another language.
Full definition →
Translation
Operational Security
The process of translating words or text from one language into another.
Full definition →
Translator
Election Administration
A person or program that translates from one language into another.
Full definition →
Transmission
Election Administration
The state that exists when information is being electronically sent from one location to one or more other locations.
Full definition →
Transmission Control Protocol
Election Administration
See TCP
Full definition →
Transmission Security (transec)
Election Administration
Measures (security controls) applied to transmissions in order to prevent interception, disruption of reception, communications deception, and/or derivation of intelligence by analysis of transmission…
Full definition →
Transmittal Envelope
Election Administration
The “envelope in which the ballot, instruc tions for voting, ballot secrecy envelope and return/verification envelope are mailed to each individual elector eligible to vote in the election.” Mont. Adm…
Full definition →
Transmitted Electronically
Voting Systems
A communication sent or received through technological apparatuses, including computer terminals or other equipment or mechanisms linked by telephone or microwave relays, or any similar apparatus havi…
Full definition →
Transparency
Legal & Policy
The ability of individuals, groups, or the general public to scrutinize the activities of election officials, voters, and other participants in the electoral process. Transparency is achieved when obs…
Full definition →
Transport Layer Security (TLS)
Cybersecurity
Protocol A security protocol providing privacy and data integrity between two communicating applications. The protocol is composed of two layers: the TLS Record Protoco l and the TLS Handshake Protoco…
Full definition →
Trap Door
Cybersecurity
1. A means of reading cryptographically protected information by the use of private knowledge of weaknesses in the cryptographic algorithm used to protect the data. 2. In cryptography, one-to-one func…
Full definition →
Tribal Clerk
Election Administration
An “official designated by the Eastern Shoshone Tribe and an official designated by the Northern Arapaho Tribe of the Wind River Reservation acting pursuant to a cooperative agreement entered into by …
Full definition →
Tribal Election
Infrastructure
An election for tribal government pursuant to 25 C. F. R. §81.1(s). Trojan Horse A form of malicious software that masquerades as a legitimate program but performs unintended functions. “A program wit…
Full definition →
Tribal Lands
Governance
The land within the jurisdiction of a federally recognized Indian tribes for which the United States government has a trust responsibility to a Native American tribe or a member of a Native American t…
Full definition →
Triple
Cybersecurity
DES (3DES) (C. F. D.) An implementation of the data encryption standard (DES) algorithm that uses three passes of the DES algorithm instead of one as used in ordinary DES applications. Triple DES prov…
Full definition →
Triple DES
Cybersecurity
An implementation of the Data Encryption Standard (DES) algorithm that uses three passes of the DES algorithm instead of one as used in ordinary DES applications. Triple DES provides much stronger enc…
Full definition →
Triple Data Encryption Algorithm
Cybersecurity
(TDEA) An approved cryptographic algorithm as required by FIPS PUB 140-2. TDEA s pecifies both the DEA cryptographic engine employed by TDEA and the TDEA algorithm itself.
Full definition →
Trojan Horse
Cybersecurity
A computer program that appears to have a useful function, but also has a hidden and potentially mali- cious function that evades security mechanisms, sometimes by exploiting legitimate authorizations…
Full definition →
Trojaning
Election Administration
To convert into a Trojan
Full definition →
Troll
Cybersecurity
A person or group of people that invites discord on the internet by starting arguments or posting inflammatory, extraneous, or off-topic messages in an online community with the deliberate intent of p…
Full definition →
Troll Farm
Election Administration
An organization whose members or employees engage in online behavior that is meant to disrupt, distract, cause conflict, and influence conversations/behavior for nefarious purposes
Full definition →
Trust Anchor
Infrastructure
An established point of trust (usually based on the authority of some person, office, or organization) from which an entity begins the validation of an authorized process or authorized (signed) packag…
Full definition →
Trust List
Election Administration
Collection of trusted certificates used by Relying Parties to authenticate other certificates.
Full definition →
Trusted Agent
Legal & Policy
(TA) 1. An individual explicitly aligned with one or more registration authority (RA) officers who has been delegated the authority to perform a portion of the RA functions. A trusted agent (TA) does …
Full definition →
Trusted Build
Software
A witnessed software build where source code is converted into machine readable binary instructions (executable code) in a manner providing security measures which help ensure that the executable code…
Full definition →
Trusted Certificate
Election Administration
A certificate that is trusted by the relying party on the basis of secure and authenticated delivery. The public keys included in trusted certificates are used to start certification paths. Also known…
Full definition →
Trusted Channel
Election Administration
A channel where the endpoints are known and data integrity is protected in transit. Depending on the communications protocol used, data privacy may be protected in transit. Examples include transport …
Full definition →
Trusted Computer System
Legal & Policy
A system that has the necessary security functions and assurance that the security policy will be enforced and that can process a range of information sensitivities (i.e. classified, controlled unclas…
Full definition →
Trusted Computing Base (TCB)
Legal & Policy
Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.
Full definition →
Trusted Distribution
Infrastructure
Method for distributing trusted computing base (TCB) hardware, software, and firmware components that protects the TCB from modification during distribution. (CNSSI-4009) (NISTIR)
Full definition →
Trusted Foundry
Election Administration
Facility that produces integrated circuits with a higher level of integrity assurance.
Full definition →
Trusted Identification Forwarding
Cybersecurity
Identification method used in information system networks whereby the sending host can verify an authorized user on its system is attempting a connection to another host. The sending host transmits th…
Full definition →
Trusted Operating System
Cybersecurity
An operating system in which there exists a level of confidence (based on rigorous analysis and testing) that the security principals and mechanisms (e.g., separation, isolation, least privilege, disc…
Full definition →
Trusted Path
Legal & Policy
A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy…
Full definition →
Trusted Platform Module (TPM)
Infrastructure
also: TPM
An international standard for a secure cryptoprocessor, which is a dedicated microprocessor designed to secure hardware by integrating cryptographic keys into devices. (UK 2016)
Full definition →
Trusted Platform Module (TPM) Chip
Election Administration
A tamper-resistant integrated circuit built into some computer motherboards that can perform cryptographic operations (including key generation) and protect small amounts of sensitive information, suc…
Full definition →
Trusted Process
Election Administration
Process that has been tested and verified to operate only as intended.
Full definition →
Trusted Recovery
Infrastructure
Ability to ensure recovery without compromise after a system failure.
Full definition →
Trusted Software
Infrastructure
Software portion of a trusted computing base (TCB). (CNSSI-4009) (NISTIR)
Full definition →
Trusted Timestamp
Election Administration
A digitally signed assertion by a trusted authority that a specific digital object existed at a particular time.
Full definition →
Trustworthiness
Election Administration
The attribute of a person or enterprise that provides confidence to others of the qualifications, capabilities, and reliability of that entity to perform specific tasks and fulfill assigned responsibi…
Full definition →
Trustworthy System
Infrastructure
Computer hardware, software and procedures that— 1) are reasonably secure from intrusion and misuse; 2) provide a reasonable level of availability, reliability, and correct operation; 3) are reasonabl…
Full definition →
Tunnel
Election Administration
“A cryptographic technique in which a computer is in effect attached to a remote LAN via the Internet, even if there is an intervening firewall.” CIVTF Appendix A.
Full definition →
Tunneling
Infrastructure
Technology enabling one network to send its data via another network’s connections. Tunneling works by encapsulating a network protocol within packets carried by the second network.
Full definition →
Turnout
Registration
The number of people attending or taking part in an event, especially the number of people voting in an election. This number is typically reported as a percentage of the total number of voters in an …
Full definition →
Two-factor Authentication
Cybersecurity
Authentication mechanism requiring two or more of the following: something you know (e.g., Password), something you have (e.g., Token), something that identifies who you are (e.g., biometrics).
Full definition →
Two-part Code
Infrastructure
Code consisting of an encoding section, in which the vocabulary items (with their associated code groups) are arranged in alphabetical or other systematic order, and a decoding section, in which the c…
Full definition →
Two-person Control (TPC)
Election Administration
The continuous surveillance and control of material at all times by a minimum of two authorized individuals, each capable of detecting incorrect or unauthorized procedures with respect to the task bei…
Full definition →
Two-person Integrity (TPI)
Infrastructure
The system of storage and handling designed to prohibit individual access to certain COMSEC keying material by requiring the presence of at least two authorized persons, each capable of detecting inco…
Full definition →
Two-round System (TRS)
Infrastructure
A plurality/majority system in which a second election is held if no candidate achieves a given level of votes, most commonly an absolute majority (50 per cent plus one), in the first election round. …
Full definition →
Two-sided Ballot
Infrastructure
A ballot having voting positions on both side s of a sheet, typically used with MARK-SENSE systems.
Full definition →
Type 1 Key
Infrastructure
Generated and distributed under the auspices of NSA for use in a cryptographic device for the protection of national security information. (CNSSI-4009, as modified) (NISTIR)
Full definition →
Type 1 Product
Infrastructure
Cryptographic equipment, assembly or component classified or certified by NSA for encrypting and decrypting national security information when appropriately keyed. Developed using established NSA busi…
Full definition →
Type 2 Key
Infrastructure
Generated and distributed under the auspices of NSA for use in a cryptographic device for the protection of unclassified information. SOURCE: CNSSI-4009, as modified
Full definition →
Type 2 Product
Infrastructure
Cryptographic equipment, assembly, or component certified by NSA for encrypting or decrypting sensitive information when appropriately keyed. Developed using established NSA business processes and con…
Full definition →
Type 3 Key
Infrastructure
Used in a cryptographic device for the protection of unclassified sensitive information, even if used in a Type 1 or Type 2 product. (CNSSI-4009) (NISTIR)
Full definition →
Type 3 Product
Infrastructure
Unclassified cryptographic equipment, assembly, or component used, when appropriately keyed, for encrypting or decrypting unclassified sensitive U. S. government or commercial information, and to prot…
Full definition →
Type 4 Key
Infrastructure
Used by a cryptographic device in support of its Type 4 functionality, i.e., any provision of key that lacks U. S. government endorsement or oversight. (CNSSI-4009) (NISTIR)
Full definition →
Type 4 Product
Election Administration
Unevaluated commercial cryptographic equipment, assemblies, or components that neither NSA nor NIST certify for any government usage. These products are typically delivered as part of commercial offer…
Full definition →
Type Accreditation (c.f.d.)
Cybersecurity
A form of accreditation that is used to authorize multiple instances of a major application or general support system for operation at approved locations with the same type of computing environment. I…
Full definition →
Type Authorization
Cybersecurity
An official authorization decision to employ identical copies of an information system or subsystem (including hardware, software, firmware, and/or applications) in specified environments of operation…
Full definition →
Type Certification
Infrastructure
The certification acceptance of replica information systems based on the comprehensive evaluation of the technical and non-technical security features of an information system and other safeguards, ma…
Full definition →
Type font
Legal & Policy
Type of a given size and style, e.g., 10-point Bodoni Modern.
human factors
Full definition →