Acronyms "Q, R, S" Flashcards
QA
Quality Assurance
QoS
Quality of Service
RA
Recovery Agent
RACE
Research and Development in Advanced Communication Technologies in Europe
RAD
Rapid Application Development
- Agile software development approach
- Focuses on ongoing software projects and user feedback and less on following a strict plan
- Emphasizes rapid prototyping over costly planning
RADIUS
Remote Authentication Dial-in User Service
- Provides centralized authentication to protect networks against unauthorized use
- Could also be used for device administration, but its primary purpose is network authentication
- Combines authentication and authorization
- Encrypts only the password field, not the entire packet.
RAID
Redundant Array of Inexpensive Disks
- Storage virtualization technology that combines multiple physical disk drive components into one or more logical units
- Used to increase data redundancy, performance, or both
- Striping - spreads blocks of data across multiple disks. Great for increased performance but provides zero data redundancy or protection
- Mirroring - copies the same data across disks. Provides data redundancy and protection from failure, but requires more disks which increases cost
- Parity - calculated value that gets used to restore data from multiple drives if one of the drives were to fail. This prevents the need to mirror using separate drives since parity is spread among disks.
- RAID 0 - striping
- Needs 2 drives minimum
- RAID 1 - mirroring
- Needs 2 drives minimum
- RAID 4 - striping and parity
- Needs 3 drives minimum
- RAID 5 - striping and parity
- Needs 3 drives minimum
- RAID 6 - striping and parity
- Needs 4 drives minimum
RAM
Random Access Memory
RAS
Remote Access Server
RAT
Remote Access Trojan
- Malware that gives the attacker admin control over the target computer
- Typically used to then take further action
RBAC
Role-Based Access Control
- Used to assign rights and permissions based on roles of users
- Roles are usually assigned by groups
RC4
Rivest Cipher 4
- Insecure
- WEP
RCS
Rich Communication Services
- Communication protocol between mobile telephone carriers and between phone and carrier, aiming at replacing SMS messages with a text-message system that is richer, provides phonebook polling (for service discovery), and can transmit in-call multimedia. It is part of the broader IP Multimedia Subsystem. Google added support for end-to-end encryption for one-on-one conversations in their own extension.
RFC
Request for Comment
RFID
Radio Frequency Identifier
- Uses electromagnetic fields to automatically identify and track tags attached to objects
- Consists of a tiny radio transponder, a radio receiver, and a transmitter
- Made up of tags and readers
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
ROI
Return on Investment
RPO
Recovery Point Objective
- an RPO of 24 hours means that the data can be recovered (from a backup copy) to a point not more than 24 hours
- The maximum amount of data (measured by time) that can be lost after a recovery from a disaster or failure
- Used to determine the frequency of backups
- ie: if an RPO is 70 minutes, you require system backups every 70 minutes
RSA
Rivest, Shamir, Adleman
- Algorithm used to encrypt and decrypt messages (public-key cryptosystem)
- Asymmetric…the public key can be known to everyone
- Messages encrypted using the public key can only be decrypted with the private key
- Slower than some
RTBH
Remote Triggered Black Hole
- Can be used to drop traffic before it enters a protected network
- A common use is to mitigate DDoS
RTO
Recovery Time Objective
- Max amount of time it can take to recover after a failure or disaster before the business is significantly impacted
RTOS
Real-Time Operating System
- Event-driven and preemptive
- Switches between tasks based on their priorities (event-driven) or on a regular clocked interrupts and on events (time-sharing)
RTP
Real-Time Transport Protocol
- Used to transfer audio/video over IP networks
- Streaming media, for example
S/MIME
Secure/Multipurpose Internet Mail Extensions
- Provides a way to integrate public-key encryption and digital signatures into most modern email clients.
- This would encrypt all email information from client to client, regardless of the communication used between email servers
SaaS
Software as a Service
SAE
Simultaneous Authentication of Equals
- Secure password-based authentication and password-authenticated key agreement method