Skip to Main Content
Idaho State University home

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
R
R&D
RAC
RAM
RAT
RC4
RD
RED
REL
RF
RFC
RFE
RFP
RKV
RL
RMR
RO
ROM
RPM
RQT
RSA
Rsh
RSN
RTI
RTM
RTS
Run
RWX
Penetration
  • The successful unauthorized access to an automated system. (AR 380-380;; FIPS PUB 39;)
  • The successful act of bypassing the security mechanisms of a system. (NCSC-WA-001-85;)
  • The successful and repeatable extraction and identification of recognizable information from a protected data file or data set without any attendant arrests. (OPNAVINST 5239. 1; DODD 5200. 28M;)
  • The act of overcoming one or more measures designed to protect an organization's operation, activity, facilities, information, or personnel. *The recruitment of agents within or the infiltration of agents or introduction of technical monitoring devices into an organization or group or physical facility for the purpose of acquiring information or influencing its activities. (IC Staff, Glossary of Intelligence Terms and Definitions, 6/89)
  • The successful act of bypassing the security mechanisms of a cryptographic or automated information system. (NSA, National INFOSEC Glossary, 10/88)