Accessibility Links

Infosec
English 繁體版 简体版

Navigation Menu 1

General UsersYoungsters & StudentsParents and TeachersIT ProfessionalsSME
FAQ Search :
Change text size: Text Size: Default Size (A) Text Size: Larger (A) Text Size: Largest (A)
general user youngsters and students parents and teachers IT professionals sme

Navigation Menu 2

 

  

 
 
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Index for glossary R

 

Relying Party

Repudiation

 

Rogue Device

Role-based Access Control (RBAC)

 

Rootkit

 

Relying Party

Anyone (or any application) that relies on someone's identity as represented by their credential.

back to top Top

Repudiation

Denial by an entity involved in a communication / transaction that s/he has participated in the activity.

back to top Top

Rogue Device

It refers to devices introduced into the network that are not authorised.

back to top Top

Role-based Access Control (RBAC)

Role-based access control (RBAC) is an authorisation mechanism in which access decisions are based on the roles that individual users have as part of an organisation.

back to top Top

Rootkit

A collection of tools or programs that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network. It often refers to that of malicious intent without going through proper authorisation and/or authentication processes.

 
 
     
Back back to topTop
 

Footer Menu

Sitemap | Contact Us | Privacy Policy | Important Notices
 
General Users Youngsters & Students Parents & Teachers IT Professionals SME