Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
r
R&D
R/W
RA
RAD
RAdAC
Radio Frequency
Radio Frequency Identification
Radio Frequency Jamming
Radio-Frequency Identification
Radionuclide Transportation Agency (fictional)
RADIUS
RAID
RAM
Random Access Memory
Random Binary Sequence
Random Bit
Random Bit Generator
Random Bit Generator.
Random Field
Random Number
Random Number Generator
Random Value
Random Variable
Randomized Hashing
Randomized Message
Randomizer
Randomness Extraction
Randomness Source
Range
Rank (of a matrix)
Rapid Application Development
Rapid Elasticity
RAR
Rate
RawSHAKE128
RawSHAKE256
RBAC
RBG
RBG Seed
RC
RC4
RCE
RCFL
Rcon[]
RCP
RDBMS
RDP
Read
Read Only Memory
Read/Write
Reader
Reader Spoofing
Reader Talks First
Read-Only Memory
Real Mode
Real Time Reaction
Real-Time
Real-Time Inter-Network Defense
Real-Time Location System
Reassociation Request
Reassociation Response
Received Signal Strength Indication
Receiver
Receiver Address
Recipient
Recipient-Usage Period
Reciprocal Agreement
Reciprocity
Recommendation
Reconstitute
Record
Records
Records Management
Recover (General)
Recover (key and/or metadata)
Recover Data
Recovery Point Objective
Recovery Procedures
Recovery Time Objective
RED
Red Data
Red Equipment
Red Key
Red Line
Red Optical Fiber Line
Red Signal
Red Team
Red Team Exercise
Red Team/Blue Team Approach
Red Wireline
RED/BLACK concept
Redundant Array Of Inexpensive Disks
Redundant Arrays Of Inexpensive Disks
Redundant Control Server
Reference Monitor
Regenerative Cyber Defense
Regional Computer Forensics Laboratory
Regional Internet Registry
Registered Application Provider Identifier
Registration
Registration Agent
Registration Authority
Registry
Regrader
Regular Expressions
Reke
Rekey
Re-Key (a certificate)
Re-Key
Relational Database Management System
Relatively Prime
Relay
Relay Station
Release Candidate
Release Prefix
Reliability, Maintainability, And Availability
Relying Party
Relying Party
Remanence
Remediation
Remote
Remote Access
Remote Access Point
Remote Access Server
Remote Assistance
Remote Authentication Dial In User Service
Remote Authentication Dial-In User Server
Remote Authentication Dial-In User Service
Remote Copy Protocol
Remote Desktop Access
Remote Desktop Protocol
Remote Diagnostics
Remote Diagnostics/ Maintenance
Remote Installation Service
Remote Maintenance
Remote Monitoring
Remote Procedure Call
Remote Rekeying
Remote System Control
Remote Terminal Unit
Remote Terminal Unitalso Remote Telemetry Unit
Removable Cover
Removable Media
Removable Media Device
Removable User Identity Module
Renew (a certificate)
Renewal
REN-ISAC
Repeatability
Replay (WLAN attack)
Replay Attacks
Reporting
Repository
Representational State Transfer
Reproducibility
Request For Comment
Request For Comments
Request For Proposal
Requester
Requestor
Required
Requirement
Research And Development
Research And Education Networking Information Sharing And Analysis Center
Réseaux Ip Européens Network Coordination Centre
Reseed
Reserve Keying Material
Reserved For Future Use
Resident Alien
Residual Data
Residual Information Protection
Residual Risk
Residue
Resilience
Resource
Resource Pooling
Resource Record
Resource Record Signature
Resource Reservation Protocol
Resource Starvation
Responsibility To Provide
Responsible Individual
Responsible Person
REST
Restoration
Restore
Restricted
Restricted Data
Result Content
Retention Period
Return On Security Investment
Reverse Channel
Reverse Path Forwarding
Reverse Soap
Review Techniques
Revocation
Revoke A Certificate
Revoked State
RF
RF Subsystem
RFC
RFD
RFID
RFP
RFU
RIB
RID
rightmost (V, a)
Rijndael
RIP
RIPE NCC
RIPng
RIPv2
RIR
RIS
Risk
Risk Adaptable Access Control
Risk Adaptiveadaptable Access Control
Risk Analysis
Risk Assessment
Risk Assessment (NIST SP 800-53 security control family)
Risk Assessment Methodology
Risk Assessment Report
Risk Assessor
Risk Executive (Function)
Risk Factor
Risk Framing
Risk Management
Risk Management Framework
Risk Mitigation
Risk Model
Risk Monitoring
Risk Response
Risk Response Measure
Risk Tolerance
Risk-Adaptable Access Control
Risk-Adaptive Access Control
Rivest Cipher 4
Rivest Shamir Adelman
Rivest Shamir Adleman
Rivest, Shamir And Adleman (algorithm)
Rivest, Shamir, Adelman ((an algorithm))
Rivest, Shamir, Adleman
Rivest, Shamir, Adleman Cryptographic Algorithm
Rivest, Shamir, Adlemanan Algorithm
Rivest, Shamir, And Adleman
Rivest-Shamir-Adelman
Rivest-Shamir-Adleman
Rivest-Shamir-Adleman Algorithm
RLS
RMA
RMF
RMON
Rnd
RNG
Rng Seed
Robust Security Network
Robust Security Network Association
Robust Security Network Information Element
Robustness
ROE
Rogue Device
Role
Role Based Access Control
Role-Based
Role-Based Access Control
Role-Based Authentication
Roles And Responsibilities
ROM
Root CA
Root Cause Analysis
Root Certificate Authority
Root Of Trust For Update
Root Of Trust For Update Verification Component
Root User
Rootkit
ROSI
ROTLn(x)
ROTRn(x)
RotWord()
Round
Round Constant
Round Index
Round Key
Route Cache Entry
Route Flap Damping
Route Optimization
Router
Router Advertisement
Router Flapping
Router Solicitation
Routing Header (IPv6 extension header)
Routing Information Base
Routing Information Protocol
Routing Information Protocol Next Generation
Routing Information Protocol Version 2
Row
Row Level Security
RP
RPC
RPF
RPM
RPM Package Manager
RPO
RR
RRSIG
RS
RSA
RSA Secret Value Encapsulation
RSA-KEM-KWS
RSA-OAEP
RSASSA-PSS RSA
RSASVE
RSN
RSNA
RSNIE
RSSI
RSVP
RT
RTA
RTF
RTLS
RTO
RTU
RTU-V
R-UIM
Rule-Based Event Correlation
Rule-Based Security Policy
Rules Of Engagement
Ruleset
Run
Runtime
rv
rv[0…b]
rv_length_indicator