Glossary R
Radio Frequency (RF) Jamming

Radio Frequency (RF) Jamming

A threat in which an adversary introduces a powerful RF signal to overwhelm the spectrum being used by the system, thus denying service to all ...

Read More

Random Number

Random Number

For the purposes of this recommendation, a value in a set that has an equal probability of being selected from the total population of possibilities ...

Read More

Random Number Generator

Random Number Generator

A process used to generate an unpredictable series of numbers. Also called a Random bit generator (RBG). See NIST SP 800-57 Part 1 Rev. 4 under Random number ...

Read More

RBAC

RBAC

Role-Based Access Control Access control based on user roles (i.e., a collection of access authorizations a user receives based on an explicit or implicit assumption of ...

Read More

Read-Only Memory

Read-Only Memory

ROM is a pre-recorded storage medium that can only be read from and not written to. See NIST SP 800-88 Rev. 1 for more detailed information. 

Read More

Record

Record

To write data on a medium, such as a magnetic tape, magnetic disk, or optical disk. See NIST SP 800-88 Rev. 1 for more information.  

Read More

Recovery Point Objective

Recovery Point Objective

The point in time to which data must be recovered after an outage. See NIST SP 800-34 Rev. 1 for more detailed information. 

Read More

Remote Access

Remote Access

Access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). See the following for ...

Read More

Remote Access Server

Remote Access Server

Devices, such as virtual private network gateways and modem servers, that facilitate connections between networks. See NIST SP 800-86 for more information.  

Read More

RADIUS

RADIUS

Remote Authentication Dial In User Service An authentication and accounting system used to control access to an Internet Service Provider (ISP) system. See NIST SP 800-47 under RADIUS (Remote Authentication Dial-In ...

Read More

Replay Attacks

Replay Attacks

An attack in which the Attacker is able to replay previously captured messages (between a legitimate Claimant and a Verifier) to masquerade as that Claimant ...

Read More

Risk Assessment

Risk Assessment

The process of identifying risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation ...

Read More

Risk Management

Risk Management

The process of managing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information ...

Read More

RMF

RMF

Risk Management FrameworkA structured approach used to oversee and manage risk for an enterprise. See NIST SP 800-12 Rev. 1 under Risk Management Framework (RMF) for detailed information. The Risk ...

Read More

Risk Mitigation

Risk Mitigation

Prioritizing, evaluating, and implementing the appropriate risk-reducing controls/countermeasures recommended from the risk management process. A subset of Risk Response.  See the following under Risk Mitigation for ...

Read More

Risk Response

Risk Response

Accepting, avoiding, mitigating, sharing, or transferring risk to organizational operations (mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation. See the following ...

Read More

Risk Tolerance

Risk Tolerance

The level of risk an entity is willing to assume in order to achieve a potential desired result. See the following under Risk Tolerance for detailed ...

Read More