Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

ransomware

A type of malware that locks users and system administrators out of computers, files, and networks until a ransom is paid. Ransomware can be unknowingly downloaded and launched when users click on email or website links.

ransomware as a service (RaaS)

A business model where threat actors can purchase pre-packaged ransomware kits to launch on their targets without needing the expertise to develop the code themselves.

rapid penetration test (RPT)

Automation that enables admins to discover, test, and report on vulnerabilities easily.

red team

Offensive security professionals, experts in attacking systems.

redaction

Blacking out sensitive data within a document or dataset.

remote monitoring and management (RMM)

A category of software that enables managed service providers (MSPs) to automate the monitoring and management of a client’s critical IT infrastructure, such as networks, hardware, workstations, servers, and other endpoints. 

representational state transfer (REST)

An architectural style consisted of a coordinated set of architectural constraints applied to components, connectors, and data elements, all within a distributed hypermedia system.