Glossary 319 remote access trojan (RAT): malware that provides the ability to remotely command a compromised computer (4) remote code execution (RCE) attack: an attack where hackers are able to execute their code on a victim’s computer from over the network (4) residual risk: the risk that remains after being mitigated or transferred (5) responsible disclosure: the steps taken to report a discovered vulnerability to an organization (3) retainer: a fee paid in advance to secure future services if and when they are needed (5) return on investment (ROI): the net savings that result from an investment (5) reverse shell:: a connection made from a compromised machine out to the hacker providing C2 access to the victim (4) RFCs (requests for comments): the standards documents used by the IETF (2) RGB (red, green, blue) color model: a 24-bit encoding scheme for colors that uses eight bits for each part of red, green, and blue (2) right to due process: a person accused of a crime must be provided a fair trial (10) right to privacy: a person cannot be subjected to unreasonable searches or seizures without a warrant (10) Risk Management Framework (RMF): a NIST standard that defines the steps needed to implement cyber risk management (5) Ritchie, Dennis: a pioneer of computing who along with Ken Thompson created the UNIX operating system (2) Rivest, Ron: a pioneer of cryptography who along with Adi Shamir and Leonard Adleman discovered the RSA cryptosystem (7) role-based access control (RBAC): an access control model where subjects are able to perform actions and access data based on their user role (8) root (rooted): gaining root level, or administrative access, to a computer through hacking (3) root access: the highest level of user access available on a Linux-based OS (8) rootkit: malware that compromises the operating system providing an extreme level of access and persistence to the compromised device (4) router: computing devices that process and route packets toward their destinations (2) row player: the player in a normal form game listed on the left (the rows) (6) Rowhammer attack: a hardware attack that exploits a vulnerability in memory chips that can be used to gain unauthorized modification access to data (5) RSA: the most widely used public key cryptosystem (7)
RkJQdWJsaXNoZXIy MTM4ODY=