R

« Back to Glossary Index

Rainbow Table: A file of pre-generated hash values and their associated plaintext

Random Access Memory (RAM): A hardware component used for short-term memory

Ransomware:  A type of malware that is a form of extortion. It works by encrypting a victim’s hard drive denying them access to key files. The victim must then pay a ransom to decrypt the files and gain access to them again. A malicious attack is where threat actors encrypt an organization’s data and demand payment to restore access. A malicious attack is where threat actors encrypt an organization’s data.

Rapport: A friendly relationship in which the people involved understand each other’s

Reconnaissance: Reconnaissance is the phase of an attack where an attacker finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.

Recover: A NIST core function related to returning affected systems back to normal operation

Recovery: The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term. The process of returning affected systems back to normal operations.

Red Hat® Enterprise Linux®: A subscription-based distribution of Linux built for enterprise use

Red Team: A group authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s cybersecurity posture.

Reflected XSS attack: An instance when a malicious script is sent to a server and

Registry: The Registry in Windows operating systems in the central set of settings and information required to run the Windows computer.

Regular Expression (regex): A sequence of characters that forms a pattern

Regulations: Rules set by a government or other authority to control the way

Relational Database: A structured database containing tables that are related to each

Relative File Path: A file path that starts from the user’s current directory

remote data centers that can be accessed via the internet

Replay Attack: A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time

Resiliency: The ability to prepare for, respond to, and recover from disruptions

Respond: A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process

Return statement: A Python statement that executes inside a function and sends

Reverse Engineering: Acquiring sensitive data by disassembling and analyzing the design of a system component.

Reverse Lookup: Find out the hostname that corresponds to a particular IP address. Reverse lookup uses an IP (Internet Protocol) address to find a domain name.

Reverse Proxy: Reverse proxies take public HTTP requests and pass them to back-end webservers to send the content to it, so the proxy can then send the content to the end-user.

Reverse Proxy Server: A server that regulates and restricts the internet’s access to an internal server

Risk: Risk is the product of the level of threat with the level of vulnerability. It establishes the likelihood of a successful attack.

Risk Assessment: A Risk Assessment is the process by which risks are identified and the impact of those risks determined.

Risk Averse: Avoiding risk even if this leads to the loss of opportunity. For example, using a (more expensive) phone call vs. sending an e-mail in order to avoid risks associated with e-mail may be considered “Risk Averse”

Risk Mitigation: The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach

Risk: Anything that can impact the confidentiality, integrity, or availability of an asset

Rivest-Shamir-Adleman (RSA): An algorithm for asymmetric cryptography, invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.

Role-Based Access Control: Role-based access control assigns users to roles based on their organizational functions and determines authorization based on those roles.

Root: Root is the name of the administrator account in Unix systems.

Root directory: The highest-level directory in Linux

Root User (or superuser): A user with elevated privileges to modify the system

Rootkit: A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.

Router: Routers interconnect logical networks by forwarding information to other networks based on IP addresses. A network device that connects multiple networks together

SEARCH GLOSSARY
« Back to Glossary Index

Shopping Cart0

Cart