Security Solutions
A-19
Appendix A: Glossary
RC4 Rivest Cipher 4. A widely used stream cipher that is used by SSL and WEP.
Also called “arcfour.” RC4 is not recommended for use by new systems
because it is not very strong cryptographically. For more information, see the
Internet Draft at http://www.mozilla.org/projects/security/pki/nss/draft-
kaukonen-cipher-arcfour-03.txt.
remediation The process by which a non-compliant endpoint is made compliant. For
example, if a Windows service pack is missing on an endpoint, the end-user
must install the service pack before being allowed network access. In this
case, an end-user screen gives the end-user instructions for running Windows
Update.
remote mirroring Technology that enables you to send mirrored traffic from network devices to
a remote analyzer using the network infrastructure rather than a dedicated
line.
remote procedure
call
See RPC.
rootkit Several programs that are secretly installed on a network device after it has
been successfully attacked. These programs give an attacker administrator-
level access so that they can open network back doors and steal personal or
network information. Rootkits are extremely difficult to detect and even more
difficult to remove.
RP Radio Port. A “thin” AP that has an antenna and transceiver but that does not
store an ACL or other configuration information. RPs are controlled centrally
from a module such as Wireless Edge Services Module.
RPC Remote Procedure Call. A procedure to permit arguments or parameters to be
sent to a program on a remote system. The remote program executes and
returns the results. RPC can be used as an alternative to an agent for testing.
RSA Rivest-Shamir-Adleman. A public-key encryption technology developed by
RSA Data Security, Inc. The RSA algorithm is based on the fact that there is
no efficient way to factor very large numbers. Deducing an RSA key, therefore,
requires an extraordinary amount of computer processing power and time.
RSA supports keys between 1024 and 2048 bits long. RSA keys can be used
for signing digital certificates. For more information, see the RSA Cryptogra-
phy Standard at http://www.rsa.com/rsalabs/node.asp?id=2125.
RSTP Rapid Spanning Tree Protocol. An evolution of STP that provides for faster
spanning-tree convergence after a topology change. RSTP prevents broadcast
storms (unintentional DoS attacks) that arise from redundant network links
in an OSI Layer 2 switched network. For more information, see IEEE 802.1D-
2004 at http://standards.ieee.org/getieee802/download/802.1D-2004.pdf.