- RSA (Rivest-Shamir-Adleman) A widely accepted public key cryptosystem developed by Ron Rivest, Adi Shamir, and Leonard Adleman. It enables secure data transmission and is commonly used for securing sensitive data, particularly when sent over an insecure network. RSA's security comes from the computational difficulty of factoring large composite integers, which is the product of two large prime numbers. RSA is employed in a multitude of security-focused applications, including SSL for web traffic, secure email, and digital signatures.
- Rule-based access An approach to managing access to system resources that revolves around a set of predefined rules. These rules are set up to govern the access capabilities of an entity based on specific conditions, such as IP address, time of access, or the particular service being accessed. This type of control enhances the security of systems by ensuring that access is granted only under defined circumstances, thereby reducing the chances of unauthorized access.
- Rule-Based Access Control (RBAC) An access control method where system access is determined by rules or policies set by an administrator. RBAC allows for complex operational conditions and is widely used due to its flexibility and the ability to enforce company security policies at a granular level.
- Rule-based management A management approach that involves establishing and enforcing rules to guide decision-making and behavior within an organization. It is often used in business and government organizations to ensure compliance with regulations and policies. Examples of rule-based management include requiring employees to follow a specific code of conduct or implementing policies to protect customer data.
- Rules of engagement in audit A set of guidelines that outline the scope, objectives, and limitations of an audit. They are typically used to ensure that the audit is conducted in a consistent and objective manner and to protect the interests of the organization being audited. Examples of rules of engagement in audit include requirements for documentation, confidentiality, and independence.
- Running Key Cipher A type of cipher that uses a long, pre-determined piece of text (known as the "key") to encrypt and decrypt messages. It is used in cryptography to encode and decode secret messages. Examples of running key cipher include using a book as the key to encrypt a message or using a string of random numbers as the key to decrypt a message.
- Runtime The period when a program or process is running or executing within a system after being loaded into memory. During this period, the program is operational and can interact with system resources (like memory and CPU) and with users. Monitoring and managing runtime is essential for performance optimization, error handling, and ensuring the smooth operation of system processes.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.