Cybersecurity Terminology

ResourcesTerms & Definitions

ransomware
- a malware designed to deny a user or organization access to files on their computer
recovery
- The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term.
red team
- A group authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s cybersecurity posture.
red team exercise
- An exercise, reflecting real-world conditions, that is conducted as a simulated attempt by an adversary to attack or exploit vulnerabilities in an enterprise's information systems.
redundancy
- Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.
Remoting
- A technology that allows a program to interact with the internals of another program running on a different machine
Repojacking
- intentionally taking over the account of an owner or maintainer who hosts a repository
resilience
- The ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption.
response
- The activities that address the short-term, direct effects of an incident and may also support short-term recovery.
risk
- The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
risk analysis
- The systematic examination of the components and characteristics of risk.
risk assessment
- The product or process which collects information and assigns values to risks for the purpose of informing priorities, developing or comparing courses of action, and informing decision making.
risk management
- The process of identifying, analyzing, assessing, and communicating risk and accepting, avoiding, transferring or controlling it to an acceptable level considering associated costs and benefits of any actions taken.
risk-based data management
- A structured approach to managing risks to data and information by which an organization selects and applies appropriate security controls in compliance with policy and commensurate with the sensitivity and value of the data.
rootkit
- A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
RTOS
- A real-time operating system (RTOS) is an OS that guarantees real-time applications a certain capability within a specified deadline.
microsoft-logo
ibm-logo
dell-logo
hp-logo
sentinel-logo
vmware-logo
Skip to content