| < Free Open Study > |
|
RADIUS (Remote Authentication Dial-In User Service), 32, 44, 48, 57
802.1X and, 60
RAID (Redundant Array of Intelligent Disks), 209-210, 241
RAM (Random Access Memory), 288
Random Access Memory (RAM), 288
RAS (Remote Access Service), 57-59
RBAC (Role-Based Access Control), 31, 43-44
Recovery controls, 202
Redundant Array of Intelligent Disks (RAID), 209-210, 241
Reference monitors, 287, 293
Relational Database Management Systems (RDBMSs), 274
Relational keys, databases, 265
Remote access, 56-59
802.1X, 59-61
e-mail security, 61-64
RAS (Remote Access Service), 57-59
terminology, 57
see also Web security; Wireless security
Remote Authentication Dial-In User Service (RADIUS), 32, 44, 48, 57
802.1X and, 60
Remote DoS attacks, 44
Remote penetration programs, 44
Replay attacks, 38-39
Requests for Comments (RFCs), 312-313, 325
Retinal scanning, 27
Retroviruses, 337
Reverse social engineering, 40
Revocation of certificates, 173-174, 183
RFCs (Requests for Comments), 312-313, 325
Rights. See Access rights
Rijndael algorithm, 157, 181
Ring topology, 101-102
Risk / threat management identification
risk analysis / assessment, 225, 235, 243
risk management, 223-224
Rivest, Ron, RSA RC series algorithms, 159-160, 190
RJ-11 and RJ-45 connectors, 106
Role-Based Access Control (RBAC), 31, 43-44
Root accounts, 349, 353
Routers, 143-144
devices, 130-131
RPC (Secure Remote Procedure Call), 126, 135
RSA RC series algorithms, 159-160
Rule-based programming, 275-276
| < Free Open Study > |
|