The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Rivest, Shamir, And Adelman (RSA)
Rivest, Shamir, And Adelman (RSA): A widely-used public key cryptosystem named after its inventors Ronald Rivest, Adi Shamir, and Leonard Adelman. In RSA, the encryption key is public and different from the decryption key, which is kept secret, making it an asymmetric cryptosystem. The security of RSA relies upon the practical difficulty of factoring the product of two large prime numbers.
- Rogue administrators in virtualization
Rogue administrators in virtualization: The individuals who, within a virtualized environment, have the ability to exploit their high-level access privileges for malicious intent. A rogue administrator may execute harmful actions such as data theft, unauthorized system modification, or disruption of services, all of which could lead to significant security breaches. Measures such as strict access controls, monitoring, and logging are used to mitigate the potential threat posed by rogue administrators.
- Rogue wireless access point
Rogue wireless access point: A wireless access point that has been installed on a secure network without explicit authorization from a local network administrator. This can present a security risk as it provides an open door for attackers to enter the network undetected, potentially leading to unauthorized access to sensitive data or disruptive activities.
- Role-Based Access Control (RBAC)
Role-Based Access Control (RBAC): A method of limiting access to computer systems based on the roles and responsibilities of individual users. It is used to ensure that only authorized users have access to sensitive information and resources. Examples include limiting access to financial data to only accounting personnel or restricting access to confidential documents to only senior management.
- Rollback
Rollback: The reversal of changes to a system, often used to restore the system to a previous state in the event of a problem. It is used to undo changes that have caused issues or to return to a well-known state. Examples include rolling back a software update that caused system instability or rolling back a configuration change that resulted in a loss of network connectivity.
- Root cause analysis
Root cause analysis: A thorough investigation method aimed at discovering the fundamental reason behind a problem or incident. It involves analyzing the sequence of events or conditions that led to the undesired outcome, with the goal of addressing these underlying issues to prevent recurrence. Root cause analysis is pivotal in cybersecurity to prevent future breaches by addressing the source, not just the symptoms, of security failures.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions 625 Hard questions
750 Complex questions
3,250 Easy/Mid questions - Both as Exam emulation and Per-Domain
201 After Topic questions
240 After Domain questions -
2,800 CISSP Flashcards Access from anywhere, on any device, at any time (web, Android, iOS apps).
Automated reminders, progress tracking, optimized spaced repetitions, confidence-based algorithm. -
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access


