This page contains a comprehensive list of cybersecurity terms starting with the letter R. From Ransomware to Root Password, learn about the most important concepts in cybersecurity.

Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) is a wireless technology used for the identification of objects or people, based on electromagnetic fields. It consists of an RFID tag and an RFID reader, which communicates with each other via radio waves.
Rainbow Table
A Rainbow Table is a precomputed table used for reversing cryptographic hash functions, to find the original plaintext input. It is often used by attackers to crack passwords.
RADIUS (Remote Authentication Dial-In User Service)
RADIUS (Remote Authentication Dial-In User Service) is a network protocol used for remote user authentication and authorization. It is commonly used in enterprise environments, where users need to access network resources from remote locations.
Ransomware
Ransomware is a type of malware that encrypts the victim’s files and demands a ransom payment in exchange for the decryption key. It is often distributed via phishing emails or exploit kits and can cause significant damage to individuals and organizations.
Ransomware-as-a-Service (RaaS)
Ransomware-as-a-Service (RaaS) is a criminal business model in which ransomware developers rent or sell their software to other criminals, who then use it to launch attacks on their targets. It has led to an increase in the number of ransomware attacks and has made it easier for non-technical criminals to get involved in cybercrime.
Real-Time Monitoring
Real-Time Monitoring is a process of collecting and analyzing data in real-time, to detect and respond to security threats as they happen. It is used in various security solutions, such as intrusion detection systems and security information and event management (SIEM) systems.
Real-Time Threat Detection
Real-Time Threat Detection is a capability of security solutions to detect and respond to security threats in real-time, using various techniques such as behavioral analysis, machine learning, and artificial intelligence. It is essential for organizations to protect against advanced and persistent threats.
Recovery Time Objective (RTO)
Recovery Time Objective (RTO) is the maximum acceptable downtime for a system or application, after a disruption or disaster. It is a critical metric in disaster recovery planning and helps organizations to minimize the impact of downtime on their operations.
Red Team
A Red Team is a group of security professionals who simulate real-world attacks against an organization’s security defenses, to identify vulnerabilities and weaknesses. It is often used in conjunction with a Blue Team, which is responsible for defending against the attacks.
Redaction
Redaction is the process of removing or obscuring sensitive information from a document or file, to protect the privacy and security of individuals or organizations. It is commonly used in legal and government documents, but also in various industries to protect sensitive data.
Redundancy
Redundancy is the duplication of critical components or systems, to provide a backup in case of failure. It is an essential component of high availability and disaster recovery planning, to ensure that systems and applications remain available and operational.
Reflection Attack
A Reflection Attack is a type of DDoS attack that exploits vulnerable network services to generate large volumes of traffic and overwhelm the target’s network or infrastructure. It is often used in conjunction with amplification techniques, to increase the volume of attack traffic.
Regulated Data
Regulated Data is data that is subject to legal or regulatory requirements, such as personally identifiable information, financial data, or healthcare information. Organizations must take appropriate measures to protect this data from unauthorized access or disclosure.
Regulatory Compliance
Regulatory Compliance refers to the process of ensuring that an organization follows all relevant laws, regulations, and standards that apply to its operations. Compliance is important for mitigating legal and financial risks and maintaining the trust of customers and stakeholders.
Relay Attack
A Relay Attack is a type of cyber attack where an attacker intercepts communication between two parties and relays it to another party without the knowledge of the original parties. This type of attack is commonly used to bypass authentication measures and gain unauthorized access to systems or data.
Reliability
Reliability is a measure of the dependability and consistency of a system or component. In cybersecurity, reliability is important for ensuring that systems and networks are available and functioning properly to prevent downtime, data loss, or other negative impacts.
Remote Access Trojan (RAT)
A Remote Access Trojan (RAT) is a type of malware that allows an attacker to take control of a victim’s computer or device remotely. RATs are often used for unauthorized access, data theft, and other malicious activities.
Remote Code Execution (RCE)
Remote Code Execution (RCE) is a type of vulnerability that allows an attacker to execute arbitrary code on a remote system or application. This type of vulnerability can be used to take control of systems, steal data, or carry out other malicious activities.
Remote Desktop Protocol (RDP)
Remote Desktop Protocol (RDP) is a protocol used to remotely access and control a computer or device. RDP is commonly used for remote support, remote work, and other purposes, but can also be a potential security risk if not properly secured.
Remote Wipe
Remote Wipe is a security feature that allows a user to erase the data on a lost or stolen device remotely. This feature can protect sensitive data from falling into the wrong hands.
Replay Attack
A Replay Attack is a type of network attack where an attacker intercepts and retransmits data that was previously captured in an attempt to bypass authentication mechanisms and gain unauthorized access.
Risk Assessment
Risk Assessment is the process of identifying, analyzing, and evaluating potential risks to an organization’s assets and infrastructure, including information and technology systems. This process is critical in developing an effective risk management plan.
Risk Management
Risk Management is the process of identifying, assessing, and prioritizing risks, and taking steps to minimize, monitor, and control those risks. This is essential in ensuring the continuity of business operations and the protection of assets.
Risk Mitigation
Risk Mitigation involves taking actions to reduce the likelihood or impact of potential risks to an organization. This can include implementing security controls and procedures, improving processes, and increasing awareness and training.
Risk Register
A Risk Register is a document that records all identified risks, their potential impact, and the steps being taken to manage them. This provides a comprehensive view of an organization’s risk profile and helps in making informed decisions.
Robocall
A Robocall is an automated phone call that delivers a pre-recorded message. This can be used for legitimate purposes, but is also commonly used for fraudulent and malicious activities, such as phishing scams.
Role-Based Access Control
Role-Based Access Control is a security model that restricts access to resources based on the roles and responsibilities of individual users within an organization. This provides granular control over access rights and helps in preventing unauthorized access.
Rogue Access Point
A Rogue Access Point is an unauthorized wireless access point that has been installed on a network. This can allow attackers to gain unauthorized access to the network and potentially compromise sensitive data.
Rogue Antivirus
Rogue Antivirus is a type of malicious software that is disguised as an antivirus program but in reality is designed to harm a computer system or steal personal information.
Rogue Certificate
A Rogue Certificate is a digital certificate that is issued by a Certificate Authority (CA) to a malicious entity that is impersonating a legitimate organization, allowing the malicious entity to carry out attacks undetected.
Rogue Code
Rogue Code refers to any malicious code that is designed to harm a computer system, steal sensitive information, or carry out other malicious activities.
Rogue Device
A Rogue Device is any unauthorized device that is connected to a network or system without proper approval, which can lead to security vulnerabilities and breaches.
Rogue DHCP Attack
A Rogue DHCP (Dynamic Host Configuration Protocol) is a type of attack where a malicious actor sets up a fake DHCP server on a network to distribute false IP addresses, potentially leading to denial-of-service attacks or information theft.
Rogue DHCP Server
A Rogue DHCP Server is a fake DHCP server that is set up by a malicious actor to distribute false IP addresses and potentially carry out attacks on a network.
Rogue Gateway
A Rogue Gateway is an unauthorized gateway device that is set up on a network without proper approval, creating potential security vulnerabilities and enabling unauthorized access.
Rogue Program
A Rogue Program is a type of malware that is disguised as a legitimate program but is designed to harm a computer system or steal sensitive information.
Rogue Scanner
A Rogue Scanner is a type of malware that is designed to look like a legitimate security program, but is actually designed to scam users by presenting false reports of malware infections and charging money for removal.
Rogue Software
Rogue Software refers to any type of malicious software that is disguised as legitimate software, and is designed to harm a computer system or steal sensitive information.
Rogue Wireless Network
A Rogue Wireless Network is an unauthorized wireless network that is set up by a malicious actor without proper approval, creating potential security vulnerabilities and enabling unauthorized access.
Root Certificate
A Root Certificate is a digital certificate that is issued by a trusted Certificate Authority (CA) and is used to verify the authenticity of other digital certificates.
Root Password
A Root Password is a password that is used to gain administrative access to a computer system or network, allowing the user to perform critical functions and make changes to the system configuration.
Download Infographics
Simply click on the letter corresponding to the infographic you’d like to download, and save the picture to your device.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Get terms per letter
Simply click on the letter corresponding to the terms you would like to see.
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cybersecurity Infographic for R
