R Flashcards
RA
(2 acronyms)
Recovery Agent
Registration Authority
Recovery Agent
An internal entity (often human) authorized to access stored key information in key backups and archives. Commonly used to help internal users.
Registration Authority
An intermediary authority that verifies user requests for a digital certificate and gives the CA the “ok” to issue certificates.
It does NOT have the power to create or issue a certificate. It merely collects necessary information to:
Receive user/device certificate requests
Validate users/devices
Authenticate users/devices
Revoke credentials if the certificate is no longer valid
–
The main purpose of an RA is to ensure that a user or device is allowed to request a digital certificate from a specific website or application. If the request is allowed, the RA forwards the certificate request to the CA, which completes the digital certificate request process.
A registration authority can be thought of as a gatekeeper to a certificate authority. In order to be issued a certificate, the requesting user or device must first register with the RA and fulfill the necessary requirements, including identity and authentication checks. This comes in the form of a certificate signing request.
RACE
Research and Development in Advanced Communications Technologies in Europe
A program launched in 1980s by the Commission of European Communities to pave the way towards commercial use of Integrated Broadband Communication (IBC) in Europe in late 1990s.
General objectives:
Promote the EU’s telecommunications industry
Enable the European network operators to compete under the best possible conditions
Enable a critical number of the Member States of EU to introduce commercially viable IBC services by 1995
Offer opportunities to service providers to improve cost-performance and introduce new services
Make new services available to final users at a cost and on a timescale at least as favourable as in other major western countries
Support the formation of a single European market for all IBC equipment and services
Contribute to regional development within the European Union, by allowing less-developed regions to benefit fully from telecommunications developments.
RAD
Rapid Application Development
An adaptive software development model based on prototyping and quick feedback with less emphasis on specific planning. Its work cycles are often shorter than agile.
RADIUS
Remote Authentication Dial-In User Service
One of the most common AAA protocols that is supported on a wide variety of platforms and devices
It centralizes authentication for users through routers, switches, firewalls, VPNs, and 802.1X network access.
RAID
Redundant Array of Inexpensive Disks
A technique that combines multiple disk drives to store data redundantly for greater reliability and faster access.
RAS
Remote Access Server
A type of server that provides a suite of services to remotely connected users over a network or the Internet. It acts as a central hub enabling remote users to connect to an internal LAN. It grants authenticated users secure access to resources within an organization’s network from any geographic location.
RAT
Remote Access Trojan
Malware designed to allow an attacker to remotely control an infected computer. It also gives the attacker full administrative privileges.
The attacker may also use a RAT as a keylogger to steal credentials. They can use this malware to install/remove software, steal files, and hijack the webcam.
RBAC
(2 acronyms)
Role-Based Access Control
Rule-Based Access Control
Role-Based Access Control
An access control model that is based on account roles (manager, director, team lead, project manager, etc.)
Administrators provide access based on the role of the user. Rights are gained implicitly instead of explicitly.
Rule-Based Access Control
An access control model that grants rights and permissions according to system-enforced rules. The administrator configures these roles and attaches them to files. These rules are then enforced once a user attempts to access the resource.
Ex.
Lab network access is only available between 9am - 5pm.
Only chrome browsers can complete this web form.
RC4
Rivest Cipher version 4
One of the most popular symmetric key stream cipher. It’s simple to apply and works quickly.
It encrypts one byte at a time via an algorithm.
RDP
Remote Desktop Protocol
A protocol for using a desktop computer remotely.
RFID
Radio Frequency Identifier
A wireless technology that uses radio waves to identify and track objects by placing an RFID tag or transponder on them. The tag contains a microchip and an antenna that transmits a unique identifier to a reader device when prompted by the reader’s radio signal.
This technology allows for non-contact, non-line-of-sight identification and tracking of items, which is beneficial for many businesses, including those involved in supply chain management, retail, logistics, and asset management.
Combining RFID and IoT technologies allows for the automation of gathering and analyzing massive amounts of information to optimize and improve businesses processes and decision-making.