Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

R

Reverse Lookup

The reverse lookup is used to locate the hostname that corresponds to a particular IP address. Reverse lookup uses an IP (internet protocol) address to find a domain name.

Letter for filtering (will be hidden in prod) :

R

Risk

Risk is the probability of a system or network attack. Risk is the potential of losing valuable and sensitive information.

Letter for filtering (will be hidden in prod) :

R

Reflexive Access Lists

Reflexive access lists are an important part of securing the network against network hackers and are generally included in a firewall defense. Reflexive access lists provide a level of security against spoofing and denial-of-service attacks. Reflexive ACLs for Cisco routers are a step towards making the router act like a stately firewall. The router makes filtering decisions based on whether connections are a part of established traffic or not.

Letter for filtering (will be hidden in prod) :

R

Reverse Proxy

A reverse proxy is a device or service that is placed between a client and a server in a network. All the incoming HTTP requests are handled by the proxy (back-end web servers), so the proxy can then send the content to the end-user.

Letter for filtering (will be hidden in prod) :

R

Registry

Registry is a system-defined database where applications and system components store and retrieve configuration data. Applications use the registry api to retrieve, modify, or delete registry data.

Letter for filtering (will be hidden in prod) :

R

RPC Scans

RPC scans determine which rpc services are running on a machine.

Letter for filtering (will be hidden in prod) :

R

Rootkit

A rootkit is a type of malicious software that is activated each time the system boots up. Rootkits are difficult to detect as they are activated before your system’s operating system has completely booted up.

Letter for filtering (will be hidden in prod) :

R

Rule Set Based Access Control (RSBAC)

Rule set based access control (RSBAC) targets actions based on rules for entities operating on objects. RSBAC is an open source access control framework for current linux kernels, which has been in stable production use since January 2000.

Letter for filtering (will be hidden in prod) :

R

Routing Loop

A routing loop is where two or more poorly configured routers repeatedly exchange the same data packet over and over. In case of distance vector protocols, the fact that these protocols route by rumor and have a slow convergence time can cause routing loops.

Letter for filtering (will be hidden in prod) :

R

Role-Based Access Control (RBAC)

Role based access control (RBAC) assigns users to roles based on their organizational functions and determines authorization based on those roles. It is used by enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC).