Glossary: R -TEISS® : Cracking Cyber Security

Glossary / Glossary: R

Glossary: R

1-10  a  b  c  d  e  f  g  h  i  j  k  l  m  n  o  p  q  r  s  t  u  v  w  x  y  

Ransom-ware Software that is designed to deny access to information and processes on that computer until a ransom is paid
RAT See Remote Access Trojan
Remote access The process of accessing a particular computer when not physically present; this can involve an authorised user accessing a corporate network from home, or an IT support worker taking control of someone’s computer over the internet in order to help them; it can also involve a hacker accessing a computer they have previously hacked into
Remote Access Trojan (RAT) A Trojan (qv) that allows an attacker to gain remote access to a computer and thus access all the data on it
Reputational damage In cyber security the damage to an organisation’s reputation that can be caused by security breaches, by inappropriate social media posts, or by a social media crisis (qv) caused by a perceived failure to deliver appropriate customer service
Residual risk The amount of risk that is left over when mitigating actions have been taken
Resilience The ability of a system or an organisation to recover from a cyber attack (qv); as cyber attacks are almost inevitable resilience is arguable more important than security
Reverse engineering The process of taking software apart to see how it works; a technique used by security engineers to defeat hackers, and by hackers to defeat security engineers
Risk assessment The process of analyzing the nature, likelihood and impact risks to an organizations IT systems
Risk management The process of managing risks by avoiding them, transferring a part of them to others (e.g. through insurance) or through mitigation (qv), or by accepting them as a cost of doing business
Rooting The process getting access to operating system of an Android phone with the intention of altering it or installing unsupported apps; this process can leave mobile phones vulnerable to all sorts of malware which could in turn infect corporate networks. See also Jailbreaking
Rootkit A piece of software that hides programs and processes running on a computer such as key-logging software (qv) in order to conceal computer misuse or data theft
Router A device that connects two or more networks or computers via the internet

Get the latest cyber news in your inbox

Join our community of cyber professionals today!