Glossary Q-R Flashcards
(43 cards)
QA (quality assurance)
Policies, procedures, and tools designed to ensure defect-free development and delivery.
QoS (quality of service)
Systems that differentiate data passing over the network that can reserve bandwidth for particular applications. A system that cannot guarantee a level of available bandwidth is often described as Class of Service (CoS). Also known as CoS.
qualitative analysis
A risk analysis method that uses opinions and reasoning to measure the likelihood and impact of risk.
quantitative analysis
A risk analysis method that is based on assigning concrete values to factors.
quantum cryptography
Using quantum computing for cryptographic tasks, such as distributing keys or cracking (traditional) cryptographic systems. Quantum computing works on the principle that its units (qubits) have more properties than the bits used in “classical” computers, notably (and very crudely) that a qubit can have a probability of being 1 or 0 and that inspecting the value of one qubit can instantly determine that of others (entanglement).
RA (recovery agent)
In PKI, an account or combination of accounts that can copy a cryptographic key from backup or escrow and restore it to a subject host or user.
RA (registration authority)
In PKI, an authority that accepts requests for digital certificates and authenticates the entities making those requests.
race condition
A software vulnerability when the resulting outcome from execution processes is directly dependent on the order and timing of certain events, and those events fail to execute in the order and timing intended by the developer.
RADIUS (Remote Authentication Dial-in User Service)
A standard protocol used to manage remote and wireless authentication infrastructures.
RAID (redundant array of independent/ inexpensive disks)
Specifications that support redundancy and fault tolerance for different configurations of multiple-device storage systems. rainbow table Tool for speeding up attacks against Windows passwords by precomputing possible hashes.
ransomware
Malware that tries to extort money from the victim by blocking normal operation of a computer and/or encrypting the victim’s files and demanding payment
Raspberry Pi
Open-source platform producing programmable circuit boards for education and industrial prototyping.
RAT (remote access Trojan)
Malware that creates a backdoor remote administration channel to allow a threat actor to access and control the infected host.
RBAC (role-based access control)
An access control model where resources are protected by ACLs that are managed by administrators and that provide user permissions based on job functions.
RCS (rich communication services)
Platform-independent advanced messaging functionality designed to replace SMS and MMS.
red team
The “hostile” or attacking team in a penetration test or incident response exercise. regex (regular expression) A group of characters that describe how to execute a specific search pattern on a given text.
replay attack
An attack where the attacker intercepts some authentication data and reuses it to try to re-establish a session.
replication
Automatically copying data between two processing systems either simultaneously on both systems (synchronous) or from a primary to a secondary location (asynchronous).
residual risk
Risk that remains even after controls are put into place.
retention policy
Dictates for how long information needs to be kept available on backup and archive systems. This may be subject to legislative requirements.
reverse proxy
A type of proxy server that protects servers from direct contact with client requests.
reverse shell
A maliciously spawned remote command shell where the victim host opens the connection to the attacking host.
risk acceptance
The response of determining that a risk is within the organization’s appetite and no countermeasures other than ongoing monitoring is needed.
risk avoidance
In risk mitigation, the practice of ceasing activity that presents risk.