R - Definitions
-
R
RADIUS (Remote Authentication Dial-In User Service)
RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
-
RAT (remote access Trojan)
A RAT (remote access Trojan) is malware an attacker uses to gain full administrative privileges and remote control of a target computer.
-
registration authority (RA)
A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
-
remote access
Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection.
-
Report on Compliance (ROC)
A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit.
-
residual risk
Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made.
-
reverse brute-force attack
A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple usernames in an attempt to gain access to a network.
-
Rijndael
Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.
-
risk analysis
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.
-
risk appetite
Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.
-
risk assessment
Risk assessment is the process of identifying hazards that could negatively affect an organization's ability to conduct business.
-
risk avoidance
Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.
-
risk exposure
Risk exposure is the quantified potential loss from business activities currently underway or planned.
-
risk map (risk heat map)
A risk map (risk heat map) is a data visualization tool for communicating specific risks an organization faces.
-
risk profile
A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.
-
risk reporting
Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.
-
risk-based authentication (RBA)
Risk-based authentication (RBA) is an authentication method in which varying levels of stringency are applied to a system’s authentication process based on the likelihood that access to that system could result in its compromise.
-
role mining
Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise... (Continued)
-
role-based access control (RBAC)
Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
-
rootkit
A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.
-
RSA algorithm (Rivest-Shamir-Adleman)
The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network, such as the internet.
-
What is ransomware? How it works and how to remove it
Ransomware is a type of malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
-
What is risk management and why is it important?
Risk management is the process of identifying, assessing and controlling threats to an organization's capital, earnings and operations.