A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

R

Radio communications

The transmission of signals by modulation of electromagnetic waves with frequencies below those of visible light.

Radio Frequency transmitter

A device designed to transmit electromagnetic radiation as part of a radio communication system.

RADIUS

Remote Access Dial-In User Service

RAM

Random-access memory

Ransomware

Malicious software that makes data or systems unusable until the victim makes a payment.

Reclassification

An administrative decision to change the controls used to protect data based on a reassessment of the potential impact of its unauthorised disclosure. The lowering of the controls for media containing sensitive or classified data often requires sanitisation or destruction processes to be undertaken prior to a formal decision to lower the controls protecting the data.

Recovery plan

A plan that outlines an organisation's recovery strategy for how they are going to respond to a cyber security incident.

Redaction

Most commonly refers to the removal of information from a document to ensure that information remains private or secret from a wide audience. It can also refer to a form of editing in which multiple sources of texts are combined and altered slightly to make a single document.

Releasable To (REL) data

Data not to be passed to, or accessed by, foreign nationals beyond those belonging to specific nations which the data has been authorised for release to.

Remote access

Access to a system that originates from outside an organisation’s network and enters the network through a gateway, including over the internet.

Remote access scam

When a scammer pretends to be affiliated with a tech or computer company, such as Apple, Telstra or their technical support division. The scammer usually tries to convince you that you have a computer or internet problem and you need to buy or install new software to fix the problem.

Remote Access Tool (RAT)

A software administration tool or program that can be used by a hacker to remotely gain access and control of an infected machine.

Remote Desktop Protocol (RDP)

A proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.

Removable media

Storage media that can be easily removed from a system and is designed for removal, such as Universal Serial Bus flash drives and optical media.

Resilience

The capacity to recover quickly from difficulties.

RF

Radio frequency

RFC

Request for Comments

Rivest-Sharmir-Adleman (RSA)

A public key cryptosystem based on the practical difficulty of factoring the product of two large prime numbers.

Romance scams

A type of scam involving feigning romantic intentions towards a victim, gaining their affection, and then using that goodwill to commit fraud. This may involve access to the victim's money, bank accounts, credit cards, passports, email accounts, or national identification numbers or forcing the victims to commit financial fraud on their behalf. Often called dating and romance scams.

Rootkit

A tool or set of tools used by an attacker in order to compromise a system, gain the highest level of privilege, and then hide their activity.

Router

A networking device that forwards data packets between computer networks.

RSS

Originally RDF Site Summary; later, two competing approaches emerged, which used the backronyms Rich Site Summary and Really Simple Syndication respectively.

RTP

Real-time Traffic Protocol