The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

Q

Qaz

A qaz is a network worm.

Letter for filtering (will be hidden in prod) :

R

Radiation Monitoring

Radiation monitoring is the process of receiving images, data, or audio from an unprotected source by snooping to radiation signals.

Letter for filtering (will be hidden in prod) :

R

Routing Information Protocol (RIP)

The routing information protocol (RIP) defines a manner for routers to share information on how to route traffic among various networks. RIP is classified by the internet engineering task force (IETF) as an interior gateway protocol (IGP), one of several protocols for routers moving traffic around within a larger autonomous system network.

Letter for filtering (will be hidden in prod) :

R

Regression Analysis

The use of scripted tests which are used to test software for all possible input is expected. Typically developers will create a set of regression tests that are executed before a new version of a software is released.

Letter for filtering (will be hidden in prod) :

R

Reconnaissance

Reconnaissance is the phase of an attack where an attacker is able to locate new systems, map out several networks, and probe for specific vulnerabilities in the system or network. It is used to obtain information by either visual observation or other detection methods about the activities and resources of an attacker.

Letter for filtering (will be hidden in prod) :

R

Request for Comments (RFC)

A request for comments (RFC) is a type of publication from the internet engineering task force (IETF) and the internet society. An RFC is authored by engineers and computer scientists in the form of a memorandum describing methods, behaviors, research, or innovations applicable to the working of the internet and internet-connected systems. RFC started in 1969, when the internet was the arpanet.

Letter for filtering (will be hidden in prod) :

R

Resource Exhaustion

Resource exhaustion is a kind of attack where the attacker or hacker ties up finite resources on a system, making them unavailable to others.

Letter for filtering (will be hidden in prod) :

R

Rivest-Shamir-Adleman (RSA)

Rivest-Shamir-Adleman (RSA) is one of the first practical public-key cryptosystems and is widely used for secure data transmission. RSA is an algorithm for asymmetric cryptography, invented in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. This is based on the practical difficulty of factoring the product of two large prime numbers, the factoring problem.

Letter for filtering (will be hidden in prod) :

R

Reverse Lookup

The reverse lookup is used to locate the hostname that corresponds to a particular IP address. Reverse lookup uses an IP (internet protocol) address to find a domain name.

Letter for filtering (will be hidden in prod) :

R

Risk

Risk is the probability of a system or network attack. Risk is the potential of losing valuable and sensitive information.