R

Glossary R
Radio Frequency (RF) Jamming

Radio Frequency (RF) Jamming

A threat in which an adversary introduces a powerful RF signal to overwhelm the spectrum being used by the system, thus denying service to all ...

Read More

Random Number

Random Number

For the purposes of this recommendation, a value in a set that has an equal probability of being selected from the total population of possibilities ...

Read More

Random Number Generator

Random Number Generator

A process used to generate an unpredictable series of numbers. Also called a Random bit generator (RBG). See NIST SP 800-57 Part 1 Rev. 4 under Random number ...

Read More

RBAC

RBAC

Role-Based Access Control Access control based on user roles (i.e., a collection of access authorizations a user receives based on an explicit or implicit assumption of ...

Read More

Read-Only Memory

Read-Only Memory

ROM is a pre-recorded storage medium that can only be read from and not written to. See NIST SP 800-88 Rev. 1 for more detailed information. 

Read More

Record

Record

To write data on a medium, such as a magnetic tape, magnetic disk, or optical disk. See NIST SP 800-88 Rev. 1 for more information.  

Read More

Recovery Point Objective

Recovery Point Objective

The point in time to which data must be recovered after an outage. See NIST SP 800-34 Rev. 1 for more detailed information. 

Read More

Remote Access

Remote Access

Access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). See the following for ...

Read More

Remote Access Server

Remote Access Server

Devices, such as virtual private network gateways and modem servers, that facilitate connections between networks. See NIST SP 800-86 for more information.  

Read More

RADIUS

RADIUS

Remote Authentication Dial In User Service An authentication and accounting system used to control access to an Internet Service Provider (ISP) system. See NIST SP 800-47 under RADIUS (Remote Authentication Dial-In ...

Read More

Replay Attacks

Replay Attacks

An attack in which the Attacker is able to replay previously captured messages (between a legitimate Claimant and a Verifier) to masquerade as that Claimant ...

Read More

Risk Assessment

Risk Assessment

The process of identifying risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation ...

Read More