АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Rainbow table attackRansomware attackRaw biometric sampleReactive monitoringRecoveringRecurrent sequenceReference monitorReference monitor conceptReference validation mechanismRegistration centerReliabilityReliabilityRemote administration tool, RATRepeated use of a key sequenceReplay attackRepudiationResidual riskResourceResponsibilityRestricted accessReviewRiskRisk acceptanceRisk aggregationRisk aggregationRisk analysisRisk assessmentRisk attitudeRisk aversionRisk avoidanceRisk criteriaRisk descriptionRisk evaluationRisk evaluationRisk financingRisk identificationRisk managementRisk managementRisk management auditRisk management frameworkRisk management planRisk management policyRisk management processRisk management, risc controlRisk matrixRisk ownerRisk perceptionRisk profileRisk rankingRisk registerRisk reportingRisk retentionRisk sharingRisk sourceRisk toleranceRisk treatmentRisk treatmentRiskwareRoleRootkitRoundRound keyRound, pass (of cryptographic protocol)RSA cryptosystemRSA encryption algorithmRun testRunning key ciphering, one-time padding