Glossary Q-R Flashcards

1
Q

QA (quality assurance)

A

Policies, procedures, and tools designed to ensure defect-free development and delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QoS (quality of service)

A

Systems that differentiate data passing over the network that can reserve bandwidth for particular applications. A system that cannot guarantee a level of available bandwidth is often described as Class of Service (CoS). Also known as CoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

qualitative analysis

A

A risk analysis method that uses opinions and reasoning to measure the likelihood and impact of risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

quantitative analysis

A

A risk analysis method that is based on assigning concrete values to factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

quantum cryptography

A

Using quantum computing for cryptographic tasks, such as distributing keys or cracking (traditional) cryptographic systems. Quantum computing works on the principle that its units (qubits) have more properties than the bits used in “classical” computers, notably (and very crudely) that a qubit can have a probability of being 1 or 0 and that inspecting the value of one qubit can instantly determine that of others (entanglement).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RA (recovery agent)

A

In PKI, an account or combination of accounts that can copy a cryptographic key from backup or escrow and restore it to a subject host or user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RA (registration authority)

A

In PKI, an authority that accepts requests for digital certificates and authenticates the entities making those requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

race condition

A

A software vulnerability when the resulting outcome from execution processes is directly dependent on the order and timing of certain events, and those events fail to execute in the order and timing intended by the developer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RADIUS (Remote Authentication Dial-in User Service)

A

A standard protocol used to manage remote and wireless authentication infrastructures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAID (redundant array of independent/ inexpensive disks)

A

Specifications that support redundancy and fault tolerance for different configurations of multiple-device storage systems. rainbow table Tool for speeding up attacks against Windows passwords by precomputing possible hashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ransomware

A

Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Raspberry Pi

A

Open-source platform producing programmable circuit boards for education and industrial prototyping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RAT (remote access Trojan)

A

Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RBAC (role-based access control)

A

An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RCS (rich communication services)

A

Platform-independent advanced messaging functionality designed to replace SMS and MMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

red team

A

The “hostile” or attacking team in a penetration test or incident response exercise. regex (regular expression) A group of characters that describe how to execute a specific search pattern on a given text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

replay attack

A

An attack where the attacker intercepts some authentication data and reuses it to try to re-establish a session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

replication

A

Automatically copying data between two processing systems either simultaneously on both systems (synchronous) or from a primary to a secondary location (asynchronous).

19
Q

residual risk

A

Risk that remains even after controls are put into place.

20
Q

retention policy

A

Dictates for how long information needs to be kept available on backup and archive systems. This may be subject to legislative requirements.

21
Q

reverse proxy

A

A type of proxy server that protects servers from direct contact with client requests.

22
Q

reverse shell

A

A maliciously spawned remote command shell where the victim host opens the connection to the attacking host.

23
Q

risk acceptance

A

The response of determining that a risk is within the organization’s appetite and no countermeasures other than ongoing monitoring is needed.

24
Q

risk avoidance

A

In risk mitigation, the practice of ceasing activity that presents risk.

25
Q

risk deterrence

A

In risk mitigation, the response of deploying security controls to reduce the likelihood and/or impact of a threat scenario. Also known as risk reduction.

26
Q

risk matrix/heat map

A

A graphical table indicating the likelihood and impact of risk factors identified for a workflow, project, or department for reference by stakeholders.

27
Q

risk mitigation

A

The response of reducing risk to fit within an organization’s risk appetite.

28
Q

risk register

A

A document highlighting the results of risk assessments in an easily comprehensible format (such as a “traffic light” grid). Its purpose is for department managers and technicians to understand risks associated with the workflows that they manage.

29
Q

risk transference

A

In risk mitigation, the response of moving or sharing the responsibility of risk to another entity, such as by purchasing cybersecurity insurance.

30
Q

risk-based framework

A

In ESA, a framework that uses risk assessment to prioritize security control selection and investment.

31
Q

robot sentry

A

A remote-controlled or autonomous robot capable of patrolling site premises or monitoring gateways.

32
Q

root CA (root certificate authority)

A

In PKI, a CA that issues certificates to intermediate CAs in a hierarchical structure.

33
Q

rootkit

A

A class of malware that modifies system files, often at the kernel level, to conceal its presence.

34
Q

router firewall

A

A hardware device that has the primary function of a router, but also has firewall functionality embedded into the router firmware.

35
Q

routing protocols

A

Rules that govern how routers communicate and forward traffic between networks.

36
Q

RPO (recovery point objective)

A

The longest period of time that an organization can tolerate lost data being unrecoverable.

37
Q

RSA (Rivest Shamir Adelman)

A

Named for its designers, Ronald Rivest, Adi Shamir, and Len Adelman, the first successful algorithm for public key encryption with a variable key length and block size.

38
Q

RTBH (remote triggered black hole)

A

Using a trigger device to send a BGP route update that instructs routers to drop traffic that is suspected of attempting DDoS.

39
Q

RTO (recovery time objective)

A

The length of time it takes after an event to resume normal business operations and activities.

40
Q

RTOS (real-time operating system)

A

A type of OS that prioritizes deterministic execution of operations to ensure consistent response for time-critical tasks.

41
Q

RTP (Real-time Transport Protocol)

A

Opens a data stream for video and voice applications over UDP. The data is packetized and tagged with control information (sequence numbering and time-stamping).

42
Q

rule-based access control

A

A non-discretionary access control technique that is based on a set of operational rules or restrictions to enforce a least privileges permissions policy.

43
Q

runbook

A

An automated version of a playbook that leaves clearly defined interaction points for human analysis.