Cybersecurity Definitions R 0 0

Posted ByVoror

Race condition

Race conditions are also known as race hazards. Race condition is the behavior of an electronic, software, or other system where the output is dependent on the sequence or timing of other uncontrollable events. This becomes a bug when events don’t happen in the order the programmer planned. Race conditions can occur in electronics systems, especially logic circuits, and in computer software, especially multithreaded or distributed programs.

Radiation monitoring

Radiation monitoring is the process of receiving images, data, or audio from an unprotected source by snooping to radiation signals.

Reconnaissance

Reconnaissance is the phase of an attack where an attacker is able to locate new systems, maps out several networks, and probes for specific vulnerabilities in the system or network. It is used to obtain information by either visual observation or other detection methods about the activities and resources of an attacker.

Reflexive acls cisco

Reflexive access lists are an important part of securing the network against network hackers and are generally included in a firewall defense. Reflexive access lists provide a level of security against spoofing and denial-of-service attacks. Reflexive acls for Cisco routers are a step towards making the router act like a stately firewall. The router makes filtering decisions based on whether connections are a part of established traffic or not.

Registry

Registry is a system-defined database where applications and system components store and retrieve configuration data. Applications use the registry api to retrieve, modify, or delete registry data.

Regression analysis

The use of scripted tests which are used to test software for all possible input is expected. Typically developers will create a set of regression tests that are executed before a new version of a software is released.

Request for comment rfc

A request for comments (rfc) is a type of publication from the internet engineering task force (ietf) and the internet society. An rfc is authored by engineers and computer scientists in the form of a memorandum describing methods, behaviors, research, or innovations applicable to the working of the internet and internet-connected systems. Rfc started in 1969, when the internet was the arpanet.

Resource exhaustion

Resource exhaustion is a kind of attack where the attacker or hacker ties up finite resources on a system, making them unavailable to others.

Response

A response is information that is sent in response to some stimulus.

Reverse address resolution protocol rarp

Reverse address resolution protocol (rarp) is a protocol where a physical machine in a local area network (lan) can request to learn its ip address from a gateway server’s address resolution protocol (arp) table or cache. When a new machine is set up, its rarp client program requests from the rarp server on the router to be sent its ip address.

Reverse engineering

Reverse engineering is also known as “back engineering” and is the process of extracting design information or any kind of sensitive information by disassembling and analyzing the design of a system component.

Reverse lookup

The reverse lookup is used to locate the hostname that corresponds to a particular ip address. Reverse lookup uses an ip (internet protocol) address to find a domain name.

Reverse proxy

A reverse proxy is a device or service that is placed between a client and a server in a network. All the incoming http requests are handled by the proxy (back-end web servers), so the proxy can then send the content to the end-user.

Risk assessment

Risk assessment is a systematic process to analyze and identify any possible threats or risks that may leave sensitive information vulnerable to attacks. It also employs methods to calculate the risk impact and eliminate such threats.

Risk averse

Risk averse means avoiding risks even if this leads to the loss of opportunity. An example is using a (more expensive) phone call vs. Sending an email in order to avoid risks associated with email may be considered “risk averse”.

Risk

Risk is the probability of a system or network attack. Risk is the potential of losing valuable and sensitive information.

Rivest shamir adleman rsa

Rivest-shamir-adleman (rsa) is one of the first practical public-key cryptosystems and is widely used for secure data transmission. Rsa is an algorithm for asymmetric cryptography, invented in 1977 by ron rivest, adi shamir, and leonard adleman. This is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem.

Role based access control

Role based access control (rbac) assigns users to roles based on their organizational functions and determines authorization based on those roles. It is used by enterprises with more than 500 employees, and can implement mandatory access control (mac) or discretionary access control (dac).

Root

Root is the user name or account that by default has access to all commands and files on a linux or other unix-like operating system. It is also referred to as the root account, root user and the super user.

Rootkit

A rootkit is a type of malicious software that is activated each time the system boots up. Rootkits are difficult to detect as they are activated before your system’s operating system has completely booted up.

Router

A router is a device that forwards or transfers data packets across networks. A router is connected to at least two networks, commonly two lans or wans or a lan and its isp’s network. Routers are located at gateways, the places where two or more networks connect.

Routing information protocol rip

The routing information protocol (rip) defines a manner for routers to share information on how to route traffic among various networks. Rip is classified by the internet engineering task force (ietf) as an interior gateway protocol (igp), one of several protocols for routers moving traffic around within a larger autonomous system network.

Routing loop

A routing loop is where two or more poorly configured routers repeatedly exchange the same data packet over and over. In case of distance vector protocols, the fact that these protocols route by rumor and have a slow convergence time can cause routing loops.

Rpc scans

Rpc scans determine which rpc services are running on a machine.

Rule set based access control rsbac

Rule set based access control (rsbac) targets actions based on rules for entities operating on objects. Rsbac is an open source access control framework for current linux kernels, which has been in stable production use since January 2000.

** The time is base on America/Chicago timezone