top of page

Cyber Terminologies and Fundamentals

Definitions 

Ransomware

Malicious software that encrypts files and demands payment for decryption.

Red Teaming

A simulated cyberattack conducted by security professionals to assess and improve defense measures.

Reverse Engineering

Analyzing software or hardware to understand its design, functionality, or vulnerabilities.

Rootkits

Malicious software that hides its presence and allows unauthorized control of a system.

Remote Code Execution (RCE)

A vulnerability that allows attackers to run malicious code on a remote system.

Risk-Based Authentication

Authentication method that adjusts security measures based on the perceived risk of the access attempt.

Radio Frequency Identification (RFID) Security

Protecting RFID systems from unauthorized access, cloning, or interference.

Registry Tampering

Modifying the Windows registry to disrupt system functionality or enable malicious actions.

Rogue Access Point

An unauthorized access point set up to compromise a network and steal data.

Ret2Libc Attack

A buffer overflow attack that redirects execution to a system library, typically libc, to execute malicious code.

Reflection DDoS Attack

A DDoS attack where the attacker exploits publicly available services to amplify the attack traffic.

Real-Time Threat Detection

Continuously monitoring systems to identify and respond to threats in real-time.

RAM Scraping Malware

Malicious software that collects sensitive data, such as credit card information, from a system's memory.

Runtime Application Self-Protection (RASP)

Security technology that detects and prevents threats within running applications.

Replay Attack

A form of attack where valid data transmission is intercepted and replayed to gain unauthorized access.

Rogue Software

Software that behaves maliciously, often appearing legitimate but performing harmful actions.

Resilience Engineering

The practice of designing systems to recover quickly from failures and withstand cyber threats.

Reputation-Based Security

A method that evaluates the trustworthiness of entities (such as websites or users) based on reputation scores.

Rebinding Attack

A method of bypassing security by manipulating DNS responses to associate a victim’s browser with a malicious server.

Rainbow Table Attack

A precomputed table used to reverse cryptographic hash functions and crack password hashes.

bottom of page