Role

In cyber security, a role is a predefined set of rights and authorisations assigned to a user, a group of users, a system or an application. It determines what the entity can see, do or modify in an information system. Roles are used to manage access in a structured way, in line with the principle of least privilege (PoLP), in order to limit access to only those resources needed to perform legitimate tasks.

Rootkit 🔴 Attack

A rootkit is a sophisticated piece of malware designed to infiltrate a computer system and maintain privileged access (often at root level) while remaining stealthy.

RPO (Recovery Point Objective)

The RPO (Recovery Point Objective) represents the maximum acceptable time interval between two data backups.

In other words, this is the maximum amount of data that a company can afford to lose in the event of a major incident, such as a server breakdown, fire or cyber-attack.

CISO (Information Systems Security Manager) 🟩 Job title

The CISO (Information Systems Security Manager) is a key role within an organisation, responsible for defining, steering and monitoring the IT security strategy. He or she ensures that data, systems and infrastructures are protected against cyber threats (ransomware, leaks, etc.), by aligning technical measures with business challenges.

RTO (Recovery Time Objective)

The RTO (Recovery Time Objective) represents the maximum acceptable length of interruption for a company after an incident, such as a breakdown or an attack. This is the time required to restore systems and resume normal operations.