The part of the radio spectrum that a device uses.
The byproduct of electrical processes, similar to electromagnetic interference. The major difference is that RFI is usually projected across a radio spectrum.
See Remote Authentication Dial-In User Service (RADIUS).
See Redundant Array of Independent (or Inexpensive) Disks (RAID).
The different types of RAID, such as RAID-0, RAID-1, and so on.
See Remote Access Server (RAS).
See Role-Based Access Control (RBAC).
See Rivest Cipher 5 (RC5).
A configuration of multiple hard disks used to provide fault tolerance, should a disk fail, or gains in efficiency. Different levels of RAID exist.
An organization that offloads some of the work from a certificate authority (CA). An RA system operates as a middleman in the process. The RA can distribute keys, accept registrations for the CA, and validate identities. The RA doesn't issue certificates; that responsibility remains with the CA.
The person receiving a certificate.
Any networking protocol that is used to gain access to a network over public communication links.
A computer that has one or more modems installed to enable remote connections to the network.
A mechanism that allows authentication of dial-in and other network connections. RADIUS is commonly used by Internet service providers (ISPs) and in the implementation of virtual private networks (VPNs).
Any attack where the data is retransmitted repeatedly (often fraudulently or maliciously). In one such possibility, a user can replay a web session and visit sites intended only for the original user.
The process of copying directory information to other servers to keep them all synchronized.
A database or database server where the certificates are stored.
An attack in which the intruder modifies information in a system.
A document creation process and a set of practices that originated in 1969 and is used for proposed changes to Internet standards.
How you react to an event.
Information that isn't made available to all and to which access is granted based on some criteria.
A virus that attacks or bypasses the antivirus software installed on a computer.
Using an IP address to find a domain name rather than using a domain name to find an IP address (normal DNS). Pointer (PTR) records are used for the reverse lookup, and often reverse DNS is used to authenticate incoming connections.
The process of re-creating the functionality of an item by first deciding what the result is and then creating something from scratch that serves the same purpose.
The process of canceling credentials that have been lost or stolen (or are no longer valid). With certificates, revocation is accomplished with a Certificate Revocation List (CRL).
See Routing Information Protocol (RIP).
An evaluation of each risk that can be identified. Each risk should be outlined, described, and evaluated on the likelihood of it occurring.
An evaluation of how much risk you and your organization are willing to take. An assessment must be performed before any other actions—such as how much to spend on security in terms of dollars and manpower—can be decided.
A cipher algorithm created by Ronald Rivest (for RSA) and known for its speed. It works through blocks of variable sizes using three phases: key expansion, encryption, and decryption.
A profile downloaded from a server at each logon. When a user logs out at the end of the session, changes are made and remembered for the next time the user logs on.
An active Dynamic Host Configuration Protocol (DHCP) server that has been added to the network and is now leasing addresses to users instead of them obtaining an address from your server.
A type of control wherein the levels of security closely follow the structure of an organization. The role the person plays in the organization (accountant, salesman, and so on) corresponds to the level of security access they have to data.
Software program that has the ability to obtain root-level access and hide certain things from the operating system.
The path to get to the destination from a source.
The number of router hops between the source and the destination in an internetwork.
A device that connects two or more networks and allows packets to be transmitted and received between them. A router determines the best path for data packets from source to destination.
A function of the Network layer that involves moving data throughout a network. Data passes through several network subnetworks using routers that can select the path the data takes. See also router.
A distance-vector route discovery protocol used by Internetwork Packet Exchange (IPX) and Internet Protocol (IP). IPX uses hops and ticks to determine the cost for a particular route. See also Internetwork Packet Exchange (IPX).
A table that contains information about the locations of other routers on the network and their distance from the current router.
One of the providers of cryptography systems to industry and government. RSA stands for the initials of the three founders of RSA Security Inc.: Rivest, Shamir, and Adleman. RSA maintains a list of standards for Public Key Cryptography Standards (PKCS).
A commercial company that produces encryption software. RSA stands for Rivest, Shamir, and Adleman, the founders of the company.
See Rule Set-Based Access Control (RSBAC).
An open-source access control framework for the Linux kernel that uses access control modules to implement Mandatory Access Control (MAC).
18.119.213.235