R - Definitions

  • R

    RADIUS (Remote Authentication Dial-In User Service)

    RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.

  • RAT (remote access Trojan)

    A RAT (remote access Trojan) is malware an attacker uses to gain full administrative privileges and remote control of a target computer.

  • registration authority (RA)

    A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.

  • remote access

    Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection.

  • Report on Compliance (ROC)

    A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit.

  • residual risk

    Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made.

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple usernames in an attempt to gain access to a network.

  • Rijndael

    Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.

  • risk analysis

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.

  • risk appetite

    Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.

  • risk assessment

    Risk assessment is the process of identifying hazards that could negatively affect an organization's ability to conduct business.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

  • risk map (risk heat map)

    A risk map (risk heat map) is a data visualization tool for communicating specific risks an organization faces.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk-based authentication (RBA)

    Risk-based authentication (RBA) is an authentication method in which varying levels of stringency are applied to a system’s authentication process based on the likelihood that access to that system could result in its compromise.

  • risk-based patch management (RBPM)

    Risk-based patch management (RBPM) is an approach to implementing patches to fix software code that prioritizes patches that address security issues posing the highest risk to the organization.

  • risk-based vulnerability management (RBVM)

    Risk-based vulnerability management (RBVM) is an approach to identifying and addressing security vulnerabilities in an organization's IT environment that prioritizes remediating vulnerabilities that pose the greatest risk.

  • role mining

    Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise... (Continued)

  • What is a rootkit?

    A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.

  • What is ransomware? Definition and complete guide

    Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.

  • What is risk exposure in business?

    Risk exposure is the quantified potential loss from currently underway or planned business activities.

  • What is risk management? Importance, benefits and guide

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital, earnings and operations.

  • What is role-based access control (RBAC)?

    Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.

  • What is the RSA algorithm?

    The RSA algorithm (Rivest-Shamir-Adleman) is a public key cryptosystem that uses a pair of keys for securing digital communication and transactions over insecure networks, such as the internet.