vocabularyQ2R Flashcards
Qualitative Risk Assessment
A technique that involves no numbers, only comparisons. This assessment type is used in ranking risks.
Quantitative Risk Assessment
A structured technique that assigns a numerical value to the likelihood and the extent of a risk.
Quantitative Risk Assessment
A structured technique which assigns a numerical value to the likelihood and the extent of a risk.
Query Language
A language with primitive statements that extract data. A query language is required by every database and database product.
RADIUS
Remote Authentication Dial-In User Server is a centralized authentication protocol that authenticates and authorizes users, generally through dial-up access, and provides the authentication mechanism that allows dial-up subjects to access objects.
RADIUS
The Remote Authentication Dial-In User Service protocol is a centralized authentication protocol that authenticates and authorizes users, generally through dial-up access, and provides the authentication mechanism that allows dial-up subjects to access objects.
RAM
Random access memory is a type of real memory. It includes dynamic RAM which is slower, cheaper, and must be periodically charged because it uses capacitors. It also includes static RAM which uses flip-flop circuits that do not lose their charges, which is faster and more expensive.
Random Access
The act of accessing memory in any order.
Reciprocal Processing Agreement
An agreement with a similar company that allows a disaster-stricken business to transfer data to the other business, thereby using their capacity until they recover.
Reference Monitor
A control layer of software within the system that stands between subjects and objects to enforce access rules.
Register
An area of extremely fast memory within the CPU that is easy for the CU and ALU to read from and write to.
Relational Database
A database architecture model which dictates that all data is stored logically as a collection of tables, each containing fields, and stored independently of each other. In a true relational database, no true relationships are stored in the database.
Replay Attack
A type of attack in which the attacker intercepts the session and records it in order to play back the session at a later time.
Ring Topology
A LAN topology in which each node is connected to its neighbor on either side and messages travel from node to node until they reach their destination. This type of topology requires each machine to either have two NIC cards or special hardware allowing the NIC to connect on two sides.
RISC
Reduced Instruction Set Computing is an instruction set design where there are few and smaller types of instructions that do one particular thing giving the compilers the option to combine small steps to get them to accomplish a specific task.
Risk
The combination of threat and vulnerability at any given time.
Risk Assessment
The process of identifying and categorizing risks that threaten each businesss priorities and processes.
ROM
Read-only memory is a type of real memory that is put on a chip at the manufacturing location. It is true read-only memory, so it can never be changed. Lowest-level instructions are put on ROM.
Rootkit
Freely available software that exploits known vulnerabilities and increases system access.
ROT3 Cipher
A type of cryptography in which each character is taken and three is added to that character to create a new character value, such as an A becoming a D.
Router
A network layer device that determines the most favorable path on which to forward network traffic.
Row
A group of fields positioned horizontally on a table. Also may be referred to as a record.
RSA Encryption
Rivest-Shamir-Adelman encryption is a patented public key encryption standard. It was created by Ronald Rivest, Adi Shamir, and Leonard Adelman in 1978.