R

Glossary R
Radio Frequency (RF) Jamming

Radio Frequency (RF) Jamming

A threat in which an adversary introduces a powerful RF signal to overwhelm the spectrum being used by the system, thus denying service to all ...

Read More

Random Number Generator

Random Number Generator

A process used to generate an unpredictable series of numbers. Also called a Random bit generator (RBG). See NIST SP 800-57 Part 1 Rev. 4 under Random number ...

Read More

Read-Only Memory

Read-Only Memory

ROM is a pre-recorded storage medium that can only be read from and not written to. See NIST SP 800-88 Rev. 1 for more detailed information. 

Read More

Recovery Point Objective

Recovery Point Objective

The point in time to which data must be recovered after an outage. See NIST SP 800-34 Rev. 1 for more detailed information. 

Read More

Remote Access

Remote Access

Access to an organizational information system by a user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet). See the following for ...

Read More

Replay Attacks

Replay Attacks

An attack in which the Attacker is able to replay previously captured messages (between a legitimate Claimant and a Verifier) to masquerade as that Claimant ...

Read More

Risk Assessment

Risk Assessment

The process of identifying risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation ...

Read More