Race condition je sigurnosni problem do kojeg dolazi kada dva procesa istovremeno i nesinkronizirano pristupaju određenom resursu sustava (memorijskom prostoru, datoteci, itd.)
A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at the same time, but because of the nature of the device or system, the operations must be done in the proper sequence in order to be done correctly.
http://www.tech-faq.com/race-condition.html
http://download.tutoriali.org/Tutorials/Security_coding/Race_Condition_propusti.pdf
http://searchstorage.techtarget.com/definition/race-condition

Rav je dio metrike OSSTMM priručnika. Predstavlja mjeru površine napada te količinu nekontroliranih interakcija s metom, izračunate preko ravnoteže Poroznosti, Ograničenja i Kontrola. U ovoj skali, 100 rava (ili 100% rava) predstavlja savršenu ravnotežu. Manje od toga znači da je premalo kontrola te je površina za napad veća. Više od toga znači prevelik broj kontrola što može predstavljati problem jer više kontrola znači povećanu kompleksnost i više problema s održavanjem.
The rav is a scale measurement of the attack surface, the amount of uncontrolled interactions with a target, which is calculated by the quantitative balance between operations, limitations, and controls. Having the ravs is to understand how much of the attack surface is exposed. In this scale, 100 rav (also shown as 100% rav for simplicity of understanding although not precisely a percentage) is perfect balance and anything less is too few controls and therefore a greater attack surface. More than 100 rav shows more controls than are necessary which itself may be a problem as controls often add interactions within a scope as well as complexity and maintenance issues.
http://www.isecom.org/research/ravs.shtml

U telekomunikacijama i programskom inženjerstvu, razmjerni rast je sposobnost sustava, mreže ili procesa da obradi rastući količinu zadataka na zadovoljavajući način, odnosno na njegovu sposobnost da bude dovoljno velik da smjesti taj porast.
In telecommunications and software engineering, scalability is the ability of a system, network or process to handle growing amounts of work in a graceful manner or its ability to be enlarged to accommodate that growth.
http://searchdatacenter.techtarget.com/definition/scalability
http://www.royans.net/arch/what-is-scalability/

RC6 algoritam predstavlja poboljšanu inačicu RC5 blokovskog algoritma koji se zasniva na rotacijama ovisnim o podatcima u bloku.
The RC6 algorithm is an evolutionary improvement over the RC5 block cipher, and like RC5, it makes essential use of data-dependent rotations.
http://www.rsa.com/rsalabs/node.asp?id=2512

Izrazi kojim se definira uzorak koji se koristi za pretraživanje teksta. Regularni izrazi se, kao i svi drugi matematički izrazi, sastoje od operatora i operanada. Operandi su jezici (skupovi riječi), a operatori oni već dobro poznati iz teorije skupova – unija, produkt i slično. Regularne izraze koriste mnogi uređivači teksta i pomoćni programi za pretragu i manipulaciju teksta ovisno o nekim uzorcima. Mnogi programski jezici podržavaju regularne izraze za manipulaciju znakovnim nizovima.
An expression that defines a patter of characters used to search text. Like all other mathematical expressions, regular expressions are made up of operators and operands. Operands represent languages, and the operators are the well known unions, intersection etc. They are used in many textual editors, and are supported by many programming languages.
http://www.java.hr/node/181 http://www.webmajstori.net/clanci/programiranje/regularni-izrazi-teorija-i-praksa-regularni-izrazi-u-teoriji/137/
http://www.zytrax.com/tech/web/regex.htm
http://www.regular-expressions.info/reference.html
http://www.osvemu.com/tutorijali/20

Napad na sigurnost pri kojem zlonamjerni napadač snima poruke te ih kasnije sam šalje u mrežu pokušavajući oponašati izvornog pošiljatelja. Ukoliko izvor ne otkrije da se radi o dupliciranoj poruci te ju prihvati, napad je uspješan.
Replay attacks use a simple method of exploiting a captured packet or packets, and resend that traffic to cause unexpected results. If the source does not detect the duplication of the communications and accepts the repeated packets, then the attack is successful.
http://www.sans.org/security-resources/security_plus/replay_attack_sp08.php
http://msdn.microsoft.com/en-us/library/aa738652.aspx

Ključni entitet u domensko-orijentiranom dizajnu (engl. Domain-Driven Design). Enkapsulira svu logiku perzistencije korisničkih objekata što ostatku objekata u domeni nudi neovisnost o konkretnoj metodi perzistencije - baza podataka, datoteka i drugo. Također, osigurava sučelje za dohvat željenih objekata skrivajući konkretan način dohvata objekata.
One of the major structural patterns encountered in DDD (Domain-Driven Design). It is used to persist and retrieve objects, thus giving the application enough flexibility to change the persistent technology without changing the rest of the model.
http://geekswithblogs.net/gyoung/archive/2006/05/03/77171.aspx
http://evan.bottch.com/2007/12/06/factory-and-repository-in-the-domain/

REST predstavlja teorijski model programske arhitekture za ostvarivanje raspodijeljenih sustava, a opisao ga je Roy Fielding u svojoj doktorskoj disertaciji. Nastao je iz WWW tehnologije uvođenjem određenih ograničenja.
REST is a style of software architecture for distributed hypermedia systems such as the World Wide Web. The term representational state transfer was introduced and defined in 2000 by Roy Fielding in his doctoral dissertation.
http://searchsoa.techtarget.com/definition/REST
http://rest.elkstein.org/2008/02/what-is-rest.html

Proces reverznog inženjerstva podrazumijeva otkrivanje tehnoloških principa i načina rada određenog uređaja, objekta ili sustava analizom njegove unutrašnje strukture. Često uključuje fizičko otkrivanje unutrašnjih dijelova (npr., mehanički uređaj, elektronička komponente, računalni program) i detaljno analiziranje. Ovisno o primjeni ciljevi mogu biti različiti. Moguće je otkriti određenu poslovnu tajnu rada uređaja, otkrivanje tajnog algoritma koji se implementira i drugo. Prilikom analize programske potpore najčešće se žali zaobići određen dio koda koji implementira određenu sigurnosnu politiku.
Reverse engineering is the process of discovering the technological principles of a human made device, object or system through analysis of its structure, function and operation. It often involves taking something (e.g., a mechanical device, electronic component, or software program) apart and analyzing its workings in detail to be used in maintenance, or to try to make a new device or program that does the same thing without using or simply duplicating (without understanding) the original.
http://searchcio-midmarket.techtarget.com/definition/reverse-engineering
http://www.npd-solutions.com/reoverview.html
http://www.wisegeek.com/what-is-reverse-engineering.htm

Čip tehnologija koja omogućava prijenos podataka sa čipa do čitača putem radijskih frekvencija. Trenutno se najviše koristi za obilježavanje proizvoda u skladištima i prodavaonicama, a u zadnje vrijeme postaje popularan za identifikaciju osoba.
Radio-frequency identification (RFID) is a technology that uses communication through the use of radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking.
http://www.aimglobal.org/technologies/RFID/what_is_rfid.asp
http://www.technovelgy.com/ct/Technology-Article.asp

RIB je baza koju svaki BGP usmjeritelj održava, a koja sadrži informacije u putovima. Na temelju podataka u toj bazi, usmjeritelj određuje kojim putem će slati pakete.
Each BGP router contains a Routing Information Base (RIB) that contains the routing information maintained by that router. With information in that base, router determines by wich route will he send packets.
http://www.inetdaemon.com/tutorials/internet/ip/routing/routing_information_base.shtml
http://www.birds-eye.net/definition/acronym/?id=1165714009
http://www.networkers-online.com/blog/2010/03/bgp-routing-information-base-rib/

Arhitektura računala koja koristi mali skup jednostavnih procesorskih naredbi. Danas predstavlja de-facto standard za ugradbena računala. Zbog jednostavnijih instrukcija moguće je u jednom taktu obaviti više operacija.
Reduced instruction set computing, is a CPU design strategy based on the insight that simplified (as opposed to complex) instructions can provide higher performance if this simplicity enables much faster execution of each instruction.
http://www.webopedia.com/TERM/R/RISC.html
http://search400.techtarget.com/definition/RISC

Rootkit-ovi su zlonamjerni programi koji su napravljeni da bi preuzeli kontrolu nad operacijskim sustavom tako da nadomjeste sustavske procese i podatke bez dopuštenja korisnika.
A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications.
http://os2.zemris.fer.hr/ns/2008_Mackovic/rootkit.htm
http://searchmidmarketsecurity.techtarget.com/definition/rootkit

Usmjeritelji su uređaji koji imaju barem dva sučelja na različitim mrežama, a usmjeravaju pakete do njihovog odredišta. Na svom putu, paketi prolaze kroz nekoliko usmjeritelja, a svaki zasebno određuje put kojim će ga dalje slati.
Routers are devices that are connected to two or more data lines from different networks and are used for forwarding data packets. Packets go through several routers before arriving to their destination.
http://www.webopedia.com/TERM/R/router.html
http://searchnetworking.techtarget.com/definition/router

Rođendanski napad je često korištena metoda u kriptoanalizi, a temelji se na matematičkom paradoksu koji pokazuje da ukoliko se slučajno odabere dvadeset i tri osobe, vjerojatnost da barem jedan par ima rođendan na isti dan je 50%. Ukoliko se odabere pedeset i tri ili više osoba, vjerojatnost je 99%.
A birthday attack refers to a class of brute-force attacks, which gets its name from the surprising result that the probability that two or more people in a group of 23 share the same birthday is greater than 1/2; such a result is called a birthday paradox. Birthday attacks are often used to find collisions of hash functions. To avoid this attack, the output length of the hash function used for a signature scheme can be chosen large enough so that the birthday attack becomes computationally infeasible.
http://www.javvin.com/networksecurity/BirthdayAttack.html
http://eprint.iacr.org/2008/288.pdf

Prihvatljiva količina gubitka poslovnih podataka, odnosno najstarije dopušteno vrijeme iz kojeg je potrebno povratiti poslovne podatke.
Acceptable amount of lost business data measured as the earliest point in time from which you data must be recovered.
https://secure.wikimedia.org/wikipedia/en/wiki/Recovery_point_objective
http://whatis.techtarget.com/definition/0,,sid9_gci1189259,00.html

Popularan algoritam kriptografije javnih ključeva baziran na faktorizaciji velikih brojeva. Predstavlja prvi algoritam koji je bio pogodan za šifriranje i potpisivanje poruka, te se smatra jednim od prvih postignuća u kriptografiji javnog ključa. RSA se koristi u mnogim protokolima za sigurnu komunikaciju i smatra se da je dovoljno siguran za sve današnje potrebe.
In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it) is an algorithm for public-key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be sufficiently secure given sufficiently long keys and the use of up-to-date implementations.
http://web.math.hr/~duje/kript/rsa.html
http://library.thinkquest.org/27158/concept2_4.html
http://searchsecurity.techtarget.com/definition/RSA

Prihvatljiva količina vremena potrebnog za ponovno pokretanje određenog poslovnog i/ili organizacijskog procesa odnosno prikupljanje količine podataka navedenih u RPO.
Acceptable amount of time needed for restarting a Business process after a disaster and acquiring the amount of Business data required by RPO.
https://secure.wikimedia.org/wikipedia/en/wiki/Recovery_time_objective
http://whatis.techtarget.com/definition/0,,sid9_gci1188984,00.html

RTP definira standardizirani format paketa za dostavu audio i video sadržaja preko IP mreža. Koristi se u komunikacijskim sustavima i sustavima za zabavu koji uključuju dohvati različitih vrsta medija (zvuk, video, sintetički sadržaj...)
RTP defines a standardized packet format for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming different types of media.
http://searchnetworking.techtarget.com/definition/Real-Time-Transport-Protocol
http://www.3cx.com/PBX/RTP.html
http://www.ietf.org/rfc/rfc1889.txt
