Day 12 Flashcards
The property of a camera to be able to swivel in various directions on demand.
PTZ
Pan-Tilt-Zoom
The monitoring and control function an organization that identifies, prevents or corrects errors in processes, procedures or products.
QA
Quality Assurance
A networking function that seeks to reserve bandwidth in order to preserve the timing and availability of communication, especially as it pertains to multimedia.
QoS
Quality of Service
The party in PKI who is capable of obtaining a private key locked away in escrow.
RA
Recovery Agent
This is the entry point of a subject into PKI. It is here that a party establishes and verifies identity before obtaining keys.
RA
Registration Authority
A model of application development that very quickly works through the development phases.
RAD
Rapid Application Development
The most common centralized authentication service.
RADIUS
Remote Authentication Dial-in User Server
A set of standards that specify varying levels of fault tolerance, performance and system requirements for hard drive data storage.
RAID
Redundant Array of Inexpensive Disks
This is a form of storage that allows specific and independent access to information and does not require a sequential read or write.
RAM
Random Access Memory
A Microsoft specific term that relates to servers that facilitate modem-based access to an intranet.
RAS
Remote Access Server
Requires payment for return of information.
Ransomware
Cryptovirology
Software that implements illicit remote control software.
RAT
Remote Access Trojan
A model of access regulation commonly used for firewalls and physical controls.
A model of access control, typically implemented in an inverted tree, where rights float down.
RBAC
Role-based Access Control
A now deprecated encryption algorithm used by SSL and WEP.
RC4
Rivest Cipher version 4
This is designed to become a successor to SMS messaging that provides communication between phones and carriers.
RCS
Rich Communication Services
Allows access to a system for remote management and help desk operations.
RDP
Remote Desktop Protocol
Documents that are largely specifications and definitions for entities on the Internet.
RFC
Request for Comments
This is a common choice for tracking small devices and objects, as well as doorway access control.
RFID
Radio Frequency Identifier
This is a hashing algorithm.
RIPEMD
RACE Integrity Primitives Evaluation Message Digest
This risk management paradigm was promulgated by the US government.
RMF
Risk Management Framework
This is the primary metric to be used when evaluating whether something is worth the time, effort or cost.
ROI
Return on Investment
Implemented by an attacker to prevent discovery or observation of activities.
Rootkit
Enables and hides access
A metric that identifies the number of transactions or quantity of data that can be acceptably lost.
RPO
Recovery Point Objective
This algorithm relies on factoring large prime numbers.
RSA
Rivest, Shamir, & Adleman
A metric that identifies the maximum amount of time allowed for an outage.
RTO
Recovery Time Objective
Cisco term that refers to a filtering technique that dumps unwanted traffic prior to being received in the target network.
RTBH
Remotely Triggered Black Hole