R


[R]

Red Book

See Trusted Network Interpretation.

Reference Monitor

A security control concept in which an abstract machine mediates accesses to objects by subjects. In principle, a reference monitor should be complete (in that it mediates every access), isolated from modification by system entities, and verifiable. A security kernel is an implementation of a reference monitor for a given hardware base.

Replicator

Any program that acts to produce copies of itself; examples include a program, a worm, a fork bomb, or a virus. It is even claimed by some that UNIX and C are the symbiotic halves of an extremely successful replicator.

Retrovirus

A retrovirus is a virus that waits until all possible backup media are infected too, so that it is not possible to restore the system to an uninfected state.

Rexd

This UNIX command is the Sun RPC server for remote program execution. This daemon is started by inetd whenever a remote execution request is made.

Risk Assessment

A study of vulnerabilities, threats, likelihood, loss or impact, and theoretical effectiveness of security measures. The process of evaluating threats and vulnerabilities, known and postulated, to determine expected loss and establish the degree of acceptability to system operations.

Risk Management

The total process in place to identify, control, and minimize the impact of uncertain events. The objective of the risk management program is to reduce risk and obtain and maintain Designated Approving Authority (DAA) approval.

Rootkit

A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network, mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan Horse software. Rootkit is available for a wide range of operating systems.

Router

An interconnection device that is similar to a bridge, but serves packets or frames containing certain protocols. Routers link LANs at the network layer.

Routing Control

The application of rules during the process of routing so as to choose or avoid specific networks, links, or relays.

RSA Algorithm

Rivest-Shamir-Aldeman algorithm—a public-key cryptographic algorithm that hinges on the assumption that the factoring of the product of two large primes is difficult.

Rules-Based Detection

The intrusion detection system detects intrusions by looking for activity that corresponds to known intrusion techniques (signatures) or system vulnerabilities. Also known as misuse detection.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net