R Flashcards

1
Q

RADIUS (Remote Authentication Dial-in User Service)

A

A security service that authenticates and authorizes dial-up users and is a centralized access control mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

read

A

An operation that results in the flow of information from an object to a subject and does not give the subject the ability to modify the object or the data within the object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

recovery planning

A

The advance planning and preparations that are necessary to minimize loss and to ensure the availability of the critical information systems of an organization after a disruption in service or a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

recovery point objective

A

The acceptable amount of data loss measured in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

recovery time objective

A

The maximum time period within which a business process must be restored to a designated service level after a disaster to avoid unacceptable consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

reference monitor concept

A

An access control concept that refers to an abstract machine that mediates all accesses to objects by subjects. The security kernel enforces the reference monitor concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

reliability

A

The assurance of a given system, or individual component, performing its mission adequately for a specified period of time under the expected operating conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

remote journaling

A

A method of transmitting changes to data to an offsite facility. This takes place as parallel processing of transactions, meaning that changes to the data are saved locally and to an off-site facility. These activities take place in real time and provide redundancy and fault tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

repudiation

A

When the sender of a message denies sending the message. The countermeasure to this is to implement digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

residual risk

A

The remaining risk after the security controls have been applied. The conceptual formulas that explain the difference between total and residual risk are

threats × vulnerability × asset value = total risk
(threats × vulnerability × asset value) × controls gap = residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

risk

A

The likelihood of a threat agent taking advantage of a vulnerability and the resulting business impact. A risk is the loss potential, or probability, that a threat will exploit a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

risk analysis

A

A method of identifying risks and assessing the possible damage that could be caused in order to justify security safeguards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

risk management

A

The process of identifying, assessing, and reducing the risk to an acceptable level and implementing the right mechanisms to maintain that level of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

role-based access control (RBAC)

A

Type of model that provides access to resources based on the role the user holds within the company or the tasks that the user has been assigned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly