Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

R

Root

Root is the user name or account that by default has access to all commands and files on a linux or other unix-like operating system. It is also referred to as the root account, root user and the super user.

Letter for filtering (will be hidden in prod) :

R

Reverse Address Resolution Protocol (RARP)

Reverse address resolution protocol (RARP) is a protocol where a physical machine in a local area network (LAN) can request to learn its IP address from a gateway server’s address resolution protocol (ARP) table or cache. When a new machine is set up, its RARP client program requests from the RARP server on the router to be sent its ip address.

Letter for filtering (will be hidden in prod) :

R

Risk Averse

Risk averse means avoiding risks even if this leads to the loss of opportunity. An example is using a (more expensive) phone call vs. Sending an email in order to avoid risks associated with email may be considered “risk averse”.

Letter for filtering (will be hidden in prod) :

R

Race Condition

Race condition is also known as race hazard. Race condition is the behavior of an electronic, software, or other system where the output is dependent on the sequence or timing of other uncontrollable events. This becomes a bug when events don’t happen in the order the programmer planned. Race conditions can occur in electronics systems, especially logic circuits, and in computer software, especially multithreaded or distributed programs.

Letter for filtering (will be hidden in prod) :

R

Router

A router is a device that forwards or transfers data packets across networks. A router is connected to at least two networks, commonly two lans or WANs or a LAN and its ISP’s network. Routers are located at gateways, the places where two or more networks connect.

Letter for filtering (will be hidden in prod) :

R

Risk Assessment

Risk assessment is a systematic process to analyze and identify any possible threats or risks that may leave sensitive information vulnerable to attacks. It also employs methods to calculate the risk impact and eliminate such threats.

Letter for filtering (will be hidden in prod) :

R

Response

A response is information that is sent in response to some stimulus.

Letter for filtering (will be hidden in prod) :

R

Reverse Engineering

Reverse engineering is also known as “back engineering” and is the process of extracting design information or any kind of sensitive information by disassembling and analyzing the design of a system component.

Letter for filtering (will be hidden in prod) :

S

Safeguarding Statement

A safeguarding statement is a statement affixed to a computer output or printout that states the highest classification being processed at the time the product was produced and requires control of the product, at that level, until determination of the true classification by an authorized individual. Synonymous with banners.

Letter for filtering (will be hidden in prod) :

S

S/MIME

An S/MIME is a set of specifications for securing electronic mail. Secure/ multipurpose internet mail extensions (S/MIME) is based upon the widely used mime standard and describes a protocol for adding cryptographic security services through mime encapsulation of digitally signed and encrypted objects. The basic security services offered by s/mime are authentication, non-repudiation of origin, message integrity, and message privacy. Optional security services include signed receipts, security labels, secure mailing lists, and an extended method of identifying the signer’s certificate(s).