Glossary- R Flashcards
race condition
A type of attack where an attacker is attempting to exploit a small window of time that may exist between the time that a resource is requested and when it is available for use.
radio resource control (RRC)
A part of the UTMS WCDMA wireless telecommunica- tions protocol that is used to facilitate the allocation of connections between mobile devices and base stations.
random access memory (RAM)
A type of semiconductor memory usually used for a computer’s main storage.
rapid application development (RAD)
A software development life cycle process characterized by small development teams, prototypes, design sessions with end users, and development tools that integrate data design, data flow, user interface, and proto- typing.
razor wire
Coiled wire with razor-like barbs that may be placed along the top of a fence or wall to prevent or deter passage by unauthorized personnel.
read-only memory (ROM)
An early form of permanent memory that cannot be modified.
reciprocal site
A data center that is operated by another company. Two or more orga- nizations with similar processing needs will draw up a legal contract that obligates one or more of the organizations to temporarily house another party’s systems in the event of a disaster.
records
Documents describing business events such as meeting minutes, contracts, financial transactions, decisions, purchase orders, logs, and reports.
recovery control
A control that is used after an unwanted event to restore a system or process to its pre-event state.
recovery point objective (RPO)
The time during which recent data will be irretriev- ably lost in a disaster. RPO is usually measured in hours or days.
recovery procedure
Instructions that key personnel use to bootstrap services that support critical business functions identified in the business impact assessment (BIA).
recovery strategy
A high-level plan for the resumption of business operations after a disaster.
recovery time objective (RTO)
The period from the onset of an outage until the re- sumption of service. RTO is usually measured in hours or days.
reduced sign-on
The use of a centralized directory service (such as LDAP or Microsoft Active Directory) for authentication into systems and applications. Users will need to log in to each system and application, using one set of login credentials.
redundant array of independent disks (RAID)
A family of technologies that is used to improve the reliability, performance, or size of disk-based storage systems.
referential integrity
The characteristic of relational database management systems that requires the database management system maintain the parent-child relationships between records in different tables and prohibits activities such as deleting parent re- cords and transforming child records into orphans.
registration authority (RA)
An entity that works within or alongside a certificate au- thority (CA) to accept requests for new digital certificates.
regulatory requirements
Formal statements, derived from laws and regulations, that describe the required characteristics a system must support.
relational database management system (rDBMS)
A database management system that permits the design of a database consisting of one or more tables that can contain fields that refer to rows in other tables. This is currently the most popular type of data- base management system.
release management
The IT function that controls the release of software programs, applications, and environments. See also IT service management.
remote access
A service that permits a user to establish a network connection from a remote location so that the user can access network resources remotely.
remote copy (RCP)
A TCP/IP application layer protocol that is an early file transfer protocol used to copy files or directories from system to system.
remote desktop protocol (RDP)
A proprietary protocol from Microsoft that is used to establish a graphic interface connection with another computer.
remote destruct
The act of commanding a device, such as a laptop computer or mo- bile device, to destroy stored data. Remote destruct is sometimes used when a device is lost or stolen to prevent anyone from being able to read data stored on the device.