Skip to main content
. 2 3 A B C D E F G H I J K L M N O P Q R S T U V W X Z

R

Radio communications

Radio communications is the transmission of signals by modulation of electromagnetic waves with frequencies below those of visible light.

Radio Frequency transmitter

A device designed to transmit electromagnetic radiation as part of a radio communication system.

RADIUS

Remote Access Dial-In User Service

RAM

Random-access memory

Random lottery

Unexpected prize and lottery scams work by asking you to pay some sort of fee in order to claim your prize or winnings from a competition or lottery you never entered.

Ransomware

Malicious software that makes data or systems unusable until the victim makes a payment.

RAT

Remote Access Tool

RDP

Remote Desktop Protocol

Reclassification

An administrative decision to change the security measures afforded to information based on a reassessment of the potential impact of its unauthorised disclosure.

The lowering of the security measures for media containing sensitive or classified information often requires sanitisation or destruction processes to be undertaken prior to a formal decision to lower the security measures protecting the information.

Recovery plan

Outlines an organisation's recovery strategy for how they are going to respond to an incident.

Redaction

Redaction is a form of editing in which multiple sources of texts are combined and altered slightly to make a single document.

REL

Releasable To

Releasable To information

Information not to be passed to, or accessed by, foreign nationals beyond those belonging to specific nations which the information has been authorised for release to.

Remote access

Access to a system that originates from outside an organisation’s network and enters the network through a gateway, including over the internet.

Remote access scam

Remote access scams, are when a scammer pretends to be affiliated with a tech or computer company, such as Apple, Microsoft, or with their technical support division. The scammer usually tries to convince you that you have a computer or internet problem and you need to buy new software to fix the problem.

Remote Access Tool

A software administration tool or program that can be used by a hacker to remotely gain access and control of an infected machine.

Remote Desktop Protocol

Remote desktop protocol is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection.

Removable media

Storage media that can be easily removed from a system and is designed for removal, for example USB flash drives or optical media.

Reports and statistics

Various reports and statistics which are available on the cyber.gov.au website.

Resilience

The capacity to recover quickly from difficulties.

Restore

Return to a former condition, place or position.

Reverse the Threat

The theme for Stay Smart Online Week. Reverse the threat means to lower the statistics of the amount of cyber attacks by putting preventative measures in place to stay safe online.

RF

Radio Frequency

RFC

Request for Comments

Romance scams

A type of scam involving feigning romantic intentions towards a victim, gaining their affection, and then using that goodwill to commit fraud. This may involve access to the victim's money, bank accounts, credit cards, passports, email accounts, or national identification numbers or forcing the victims to commit financial fraud on their behalf.  Often called dating and romance scams.

Rootkit

A tool or set of tools used by an attacker in order to compromise a system, gain the highest level of privilege, and then hide their activity.

Router

A networking device that forwards data packets between computer networks.

RSA

Rivest-Sharmir-Adleman

RSS

Originally RDF Site Summary; later, two competing approaches emerged, which used the backronyms Rich Site Summary and Really Simple Syndication respectively.

RTP

Real-time Traffic Protocol