The Security Guide Security Guide RSS Feed


Internet and Data Security Knowledgebase

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 


Repudiation For example, buying something from an online auction and then failing to pay for it. Deleting or modifying a file in an untraceable or deniable way.
Rijndael In cryptography, the Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.
Risk matrices Risk matrices provide information to assess the risk posed by the security vulnerabilities. They can be used to identify the systems most at risk.
Rogue dialler A dialler that is created by criminals to dial premium rate numbers.
Root access Gaining access to a computer as a root user (an administrative user account with special privileges).
Root kit A set of tools used by hackers to get control of a computer.

© RuleWorks - All Rights Reserved - Policy -