loader image
Skip to main content
Completion requirements

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  (Next)
  ALL

R

RAID (Redundant Array of Independent Disks)

A storage technology that combines multiple physical disks into one logical unit for redundancy, performance, or both.

Rainbow Table

A precomputed table used to reverse unsalted hashes (commonly for passwords). Using strong salts and modern password hashing functions defeats rainbow table attacks by making precomputation ineffective.

RAM Capture

The collection of a system’s memory (RAM) for forensic analysis. RAM can contain running process information, decrypted content, chat fragments, network artifacts, and sometimes encryption material; results depend on timing and system activity.

Random Number Generator (RNG)

A system used to produce random or pseudo-random values for cryptographic operations such as key generation, nonces, salts, and signature randomness. Weak or predictable randomness can completely break encryption and signatures.

Ransomeware

Ransomware is a type of malware that encrypts a victim's files, rendering them inaccessible until a ransom is paid to the attacker to restore access. The ransom is typically demanded in the form of cryptocurrency, such as Bitcoin, in order to maintain the anonymity of the attacker.

Ransomware attacks can be particularly devastating for individuals and organizations, as they can result in the loss of important data and disruption of business operations. In some cases, victims may be unable to recover their data even if the ransom is paid, as there is no guarantee that the attacker will actually restore access to the files.

There are several types of ransomware, including:

  1. Cryptojacking ransomware: This type of ransomware uses the victim's computer resources to mine cryptocurrency for the attacker.

  2. Encrypting ransomware: This type of ransomware encrypts the victim's files and demands a ransom in exchange for the decryption key.

  3. Locker ransomware: This type of ransomware locks the victim out of their computer or device and demands a ransom in order to restore access.

  4. Ransomware-as-a-service: This type of ransomware is offered as a service to other attackers, who can use it to carry out ransomware attacks on their own.

One well-known example of ransomware is the WannaCry attack, which affected thousands of organizations and individuals in 2017. The WannaCry ransomware encrypted victims' files and demanded a ransom of $300 in Bitcoin in order to restore access.

Overall, ransomware is a serious threat to individuals and organizations, and can result in significant financial and operational losses. It is important to take measures to protect against ransomware, such as keeping software and security systems up to date and regularly backing up data.



Ransomware

Malware that encrypts or disables systems and demands payment, often in cryptocurrency; commonly paired with extortion threats.

Real-Time Operating System (RTOS)

A Real-Time Operating System (RTOS) is a specialized operating system designed to run applications with precise timing requirements. RTOS is commonly used in ICS, IIoT, and embedded systems to ensure real-time control and execution of processes.

Reasonable Suspicion

A lower legal standard than probable cause, based on specific and articulable facts suggesting criminal activity. It may justify certain investigative steps (depending on jurisdiction), but typically does not authorize intrusive searches of digital content without additional legal process.

Red Flag Indicator

A pattern or behavior that may warrant heightened scrutiny for financial crime risk (not proof of wrongdoing).

Red Team

A cyber red team is a type of security assessment that involves simulating real-world attack scenarios within an organization’s network environment in order to identify any existing weaknesses or vulnerabilities that could be exploited by malicious actors. A cyber security red team is essentially a specialized group of cyber security professionals who use their knowledge of the latest attack techniques to test a company’s security posture across the entirety of its networks and systems. The primary goal of a cyber red team is to identify and assess any potential threats and vulnerabilities before they can be exploited by malicious actors.

The cyber red team generally consists of experienced professionals with a deep understanding of the cyber security landscape and the latest attack techniques. They are often skilled in advanced penetration testing, detailed SecOps, forensics, and threat intelligence. Cyber red teams are typically employed by organizations to constantly assess their security posture and ensure that their networks and systems are secure against potential threats.

In addition to assessing a company’s security posture, the cyber red team may also be tasked with looking for any areas of weakness within the organization’s policies and procedures. This can include evaluating the effectiveness of employee training and security policies, as well as ensuring that the organization is following the latest government regulations. Once any weak spots have been identified, the cyber red team works with the organization to develop security measures and best practices for addressing them.

Essentially, the cyber red team provides organizations with in-depth security assessments of their current security posture and helps them identify any areas of improvement. By acting as a proactive security measure, the cyber red team helps organizations reduce the risk of being compromised by malicious actors and protect the security of their networks and systems.



Page:  1  2  (Next)
  ALL