- Redundant site A mirror or duplicate of the primary site, housing the same data and capabilities. It serves as a backup or disaster recovery solution, enabling continued operations even when the main site experiences downtime, disruptions, or catastrophic events. Its role can be passive, waiting in the wings to take over when needed, or active, participating in load balancing to improve performance and reliability.
- Refactoring The process of restructuring or reorganizing existing code while maintaining its functionality. This practice is used to enhance code readability, reduce complexity, improve source code maintainability, and optimize system efficiency. It also facilitates easier troubleshooting and upgradeability, helping in identifying potential vulnerabilities and ensuring code adheres to the latest coding standards.
- Reference monitor A critical component of an access control system. It's responsible for regulating interactions between subjects (users or processes) and objects (resources) within a system. This is done by enforcing an access control policy that determines who or what can access certain resources and what operations they can perform. Its design must be tamper-proof and constantly active to ensure reliable enforcement of security policies.
- Register A register is a small, high-speed storage area within a computer's processor designed to hold and quickly access data needed for computation. Each processor core contains multiple registers, which temporarily store specific types of data, like instruction operands, addresses, and control information. They play a crucial role in the overall system performance, acting as a bridge between memory and the processing unit for rapid data access.
- Registered ports The range of port numbers that are reserved for well-known services, such as HTTP (port 80) and HTTPS (port 443). They are used in networking to identify the type of service running on a particular port. Examples include port 25 for SMTP, port 53 for DNS, and port 3389 for RDP.
- Registration Authority (RA) A trusted entity that is responsible for verifying the identity of individuals or organizations and issuing digital certificates. It is used in public key infrastructure (PKI) to establish trust and secure communication. Examples include a CA that verifies the identity of a user before issuing a digital certificate or an RA that verifies the identity of an organization before issuing an SSL certificate.
- Regression testing The process of testing a software application after changes have been made to ensure that the changes have not introduced new defects or broken existing functionality. It is commonly used in software development to verify the stability and reliability of a system. Examples include running a suite of automated test cases after a code update or manually testing specific features after a bug fix.
- Regulation A rule or directive issued by a government agency to control or influence an industry or activity. It is used to protect the public interest and ensure compliance with standards and requirements. Examples include HIPAA, which regulates the use and disclosure of personal health information, and PCI DSS, which sets standards for securing payment card data.
- Regulatory policy (in IT and Cybersecurity) Guidelines and practices that govern how organizations comply with laws and regulations related to information technology and data security. These policies help ensure that organizations meet specific industry standards, like GDPR for data protection and Sarbanes-Oxley for financial reporting, to protect consumer data and maintain privacy.
- Regulatory requirements Obligations that organizations need to meet to comply with relevant laws, regulations, or standards set by governmental or oversight bodies. These requirements often pertain to data privacy, financial reporting, operational safety, and similar critical aspects within an organization's operations. Non-compliance can result in legal consequences, fines, or damage to reputation, emphasizing the necessity of compliance management systems to ensure these requirements are met.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.