The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

R

Reflexive Access Lists

Reflexive access lists are an important part of securing the network against network hackers and are generally included in a firewall defense. Reflexive access lists provide a level of security against spoofing and denial-of-service attacks. Reflexive ACLs for Cisco routers are a step towards making the router act like a stately firewall. The router makes filtering decisions based on whether connections are a part of established traffic or not.

Letter for filtering (will be hidden in prod) :

R

Reverse Proxy

A reverse proxy is a device or service that is placed between a client and a server in a network. All the incoming HTTP requests are handled by the proxy (back-end web servers), so the proxy can then send the content to the end-user.

Letter for filtering (will be hidden in prod) :

R

Registry

Registry is a system-defined database where applications and system components store and retrieve configuration data. Applications use the registry api to retrieve, modify, or delete registry data.

Letter for filtering (will be hidden in prod) :

R

RPC Scans

RPC scans determine which rpc services are running on a machine.

Letter for filtering (will be hidden in prod) :

R

Rootkit

A rootkit is a type of malicious software that is activated each time the system boots up. Rootkits are difficult to detect as they are activated before your system’s operating system has completely booted up.

Letter for filtering (will be hidden in prod) :

R

Rule Set Based Access Control (RSBAC)

Rule set based access control (RSBAC) targets actions based on rules for entities operating on objects. RSBAC is an open source access control framework for current linux kernels, which has been in stable production use since January 2000.

Letter for filtering (will be hidden in prod) :

R

Routing Loop

A routing loop is where two or more poorly configured routers repeatedly exchange the same data packet over and over. In case of distance vector protocols, the fact that these protocols route by rumor and have a slow convergence time can cause routing loops.

Letter for filtering (will be hidden in prod) :

R

Role-Based Access Control (RBAC)

Role based access control (RBAC) assigns users to roles based on their organizational functions and determines authorization based on those roles. It is used by enterprises with more than 500 employees, and can implement mandatory access control (MAC) or discretionary access control (DAC).

Letter for filtering (will be hidden in prod) :

R

Root

Root is the user name or account that by default has access to all commands and files on a linux or other unix-like operating system. It is also referred to as the root account, root user and the super user.

Letter for filtering (will be hidden in prod) :

R

Reverse Address Resolution Protocol (RARP)

Reverse address resolution protocol (RARP) is a protocol where a physical machine in a local area network (LAN) can request to learn its IP address from a gateway server’s address resolution protocol (ARP) table or cache. When a new machine is set up, its RARP client program requests from the RARP server on the router to be sent its ip address.