Reference monitor

Reference monitor: A critical component of an access control system. It’s responsible for regulating interactions between subjects (users or processes) and objects (resources) within a system. This is done by enforcing an access control policy that determines who or what can access certain resources and what operations they can perform. Its design must be tamper-proof […]

Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP): A protocol used to remotely connect and control a computer or network. It is commonly used for remote access to work on computers or remote administration of networks. Examples include accessing a work computer from home, remotely troubleshooting a network issue, or remotely managing servers in a data center.

Register

Register: A register is a small, high-speed storage area within a computer’s processor designed to hold and quickly access data needed for computation. Each processor core contains multiple registers, which temporarily store specific types of data, like instruction operands, addresses, and control information. They play a crucial role in the overall system performance, acting as […]

Registered ports

Registered ports: Port numbers ranging from 1024 to 49151 that are reserved for specific well-known services in networking. Examples include HTTP on port 80, HTTPS on port 443, SMTP on port 25, DNS on port 53, and RDP on port 3389.

Registration Authority (RA)

Registration Authority (RA): A trusted entity responsible for verifying the identity of individuals or organizations and issuing digital certificates. It plays a critical role in public key infrastructure (PKI) to establish trust and secure communication. Examples include a Certificate Authority (CA) that verifies a user’s identity before issuing a digital certificate or an RA that […]

Regression testing

Regression testing: The process of testing a software application after changes have been made to ensure that the changes have not introduced new defects or broken existing functionality. It is commonly used in software development to verify the stability and reliability of a system. Examples include running a suite of automated test cases after a […]