Glossary of Cyber Security Terms

Essential Vocabulary for Navigating the World of Cyber Security

R

Race Condition

When two or more actions occur simultaneously, there's a chance for a "race condition." In cybersecurity, this exploit takes advantage of the narrow gap between a security measure's activation and the service's use.

Radiation Monitoring

In the world of cybersecurity, radiation monitoring is akin to electronic eavesdropping. It listens to unshielded radiation signals, intercepting images, data, or audio from unsuspecting sources.

Ransomware

Ransomware is the digital equivalent of kidnapping. This insidious malware encrypts a victim's files, holding them hostage until a ransom is paid for their release.

Reconnaissance

Reconnaissance is the cyber attacker's preliminary phase, their scouting mission. It's here they discover new systems, map networks, and sniff out exploitable weaknesses.

Reflexive ACLs (Cisco)

A Reflexive Access Control List (ACL) on a Cisco router is a step towards stateful firewall operation. It decides on filtering based on whether connections are part of established traffic.

Registry

In Windows environments, the Registry serves as the computer's brain. It's a centralized hub storing all settings and information needed to operate the Windows machine.

Regression Analysis

Regression analysis is a thorough software testing approach, employing scripted tests to check for every possible input. It's often used in conjunction with fuzzing before a new software version is released.

Request for Comment (RFC)

An RFC is like an open suggestion box for the Internet. These notes, started back when the Internet was ARPANET in 1969, can evolve into Internet standards if they gain enough traction.

Resource Exhaustion

Resource exhaustion attacks are like digital sieges. They consume finite resources on a system, rendering them unavailable for others.

Response

In the context of digital communication, a response refers to the information sent as a reaction to a certain stimulus.

Reverse Address Resolution Protocol (RARP)

The Reverse Address Resolution Protocol is a digital helper for a physical machine in a local network, allowing it to request its IP address from a gateway server's Address Resolution Protocol table or cache.

Reverse Engineering

Reverse engineering is a technological sleuthing method, disassembling and analyzing a system's design to extract sensitive data.

Reverse Lookup

Reverse lookup in network parlance is detective work, finding out the hostname that corresponds to a specific IP address.

Reverse Proxy

Reverse proxies are like digital go-betweens. They take public HTTP requests, passing them to back-end web servers for content retrieval, before delivering the content to the end-user.

Risk

Risk in cybersecurity is a combination of threat level and vulnerability. It's the likelihood measure of a successful attack.

Risk Assessment

Risk assessment is the methodical process of identifying risks and determining their potential impact.

Risk Averse

Being risk averse in the digital realm means preferring caution over opportunity. For instance, choosing a phone call over email to avoid the latter's associated risks.

Rivest-Shamir-Adleman (RSA)

RSA is a key player in asymmetric cryptography. This algorithm was invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.

Role Based Access Control

Role Based Access Control (RBAC) is a digital bouncer. It assigns users to roles based on their functions, and determines their authorization accordingly.

Root

Root is the administrator's account name in Unix systems, the digital equivalent of a master key.

Rootkit

A rootkit is a hacker's camouflage kit. It's a set of tools that conceals a system intrusion and grants the attacker high-level access to a computer or network.

Router

Routers are the switchboards of the internet. They interconnect logical networks, forwarding information to other networks based on IP addresses.

Routing Information Protocol (RIP)

Routing Information Protocol is a protocol acting as an interior gateway for routing. It uses the number of hops as the only metric of a path's cost.

Routing Loop

A routing loop is a digital version of a roundabout, where two or more improperly configured routers continually exchange the same packet.

RPC Scans

RPC scans are akin to cyber pat-downs, identifying which Remote Procedure Call (RPC) services are running on a machine.

Rule Set Based Access Control (RSBAC)

RSBAC decides the actions of entities operating on objects based on a predefined set of rules, thereby reinforcing a system's security.