Reverse Engineering
The process of analyzing and understanding the design, structure, or functionality of an existing system or application to replicate or modify it.
Right to Erasure
The legal right of individuals to request the deletion or removal of their personal data from databases or systems.
Risk
An uncertain event or condition that, if it occurs, has a positive or negative effect on a project’s objectives.
Risk Identification
The process of determining risks that could potentially prevent the project, program or investment from achieving its objectives. It includes documenting and communicating the concern.
Risk Management
The identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.
Risk Register
Record of the risks identified in a project or program that are monitored by the team to determine when or if they will occur. As a best practice, each identified risk should be assigned to one of more persons whose responsibility it is to monitor the risk triggers and implement the risk response plan should...
Robotic Process Automation
Perform “if, then, else” statements on structured data, typically using a combination of user interface (UI) interactions or by connecting to APIs to drive client servers, mainframes or HTML code. An RPA operates by mapping a process in the RPA tool language for the software “robot” to follow.
Role-Based Access Control
A security model that restricts system access based on predefined roles and permissions assigned to individual users or user groups.
Role Based Security
Strategy of designing the permissions or authorizations that are granted in the system based on the roles a person performs and/or their position in the organizational hierarchy. The permissions to access and update information in the systems are assigned to these roles.
Scalability
The degrees to which the system, network, or process of a computer’s hardware or software can be expanded in size, volume, or number of users served and continue to function properly. The ability of a system or network to handle increasing workloads and data volumes while maintaining performance and responsiveness.