Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] Rabbits Radio frequency identification (RFID) RAND Corporation 2nd Random number sequences Random sample control Ranum, Marcus RC2 cipher RC4 cipher RC5 cipher RC6 algorithm Read-only files, viruses Realism Rearrangement [See Permutations.] Recipients Reconnaissance Records, database 2nd Recovery from backup Redaction Tool Redundancy database reliability multilevel databases networks process comparison Reference monitor Refunds Registration copyright patents web privacy Regression testing Regulation of Investigatory Powers Act (RIPA) Regulation, economics Relational operators Relations, database Relatively prime values Release proliferation Reliability databases [See also Integrity.] commit flag committing updates concurrency consistency 2nd correction codes data form checks definition error detection filters intent phase monitors operating system protection features patterns recovery from backup redundancy shadow fields shadow values state constraints transition constraints two-phase update Religion, and ethics Relocation Relocation factor Remailers Remanence, magnetic Repeaters, network Replay attack Reporting computer crime program flaws Reprocessing used data items Request For Comment (RFC) Requirements checking Requirements of novelty Resident viruses Resilience, network Resorla, Eric Respondent types Response CERT (Computer Emergency Response Team) intrusion detection limited response suppression plans teams to alarms Responsibility for security Restricted content Restricted usage Results versus process organizations Retina pattern authentication [See Biometrics.] Return on investment (ROI) Reverse engineering Reviews, design and code Revocation of access Revolving backups RFC (Request For Comment) RFID (radio frequency identification) .rhosts file Right, versus wrong [See Ethics.] Rights of employees and employers copyright ownership employee contracts licensed software patent ownership product ownership trade secrets work for hire Rijmen, Vincent Rijndael algorithm 2nd [See also AES (Advanced Encryption System).] Ring of trust RIPA (Regulation of Investigatory Powers Act) Risk analysis [See also Security plan.] classical probability Delphi approach FMEA (failure modes and effects analysis) frequency probability FTA (fault tree analysis) hazard analysis techniques HAZOP (hazard and operability studies) IVAs (Integrated Vulnerability Assessments) nature of risk probability pros and cons steps involved in alternative steps asset identification control selection cost/benefit analysis expected loss computations exploitation estimation savings projections vulnerability identification subjective probability VAM (Vulnerability Assessment and Mitigation) Risks definition exposure impact leverage nature of prediction [See also Risk analysis.] Rituals, organizational Rivest, Ron Rivest-Shamir-Adelman (RSA) encryption [See RSA (Rivest-Shamir-Adelman) encryption.] .rlogin file Rochefort, Joseph Rogue access points Rogue programs [See Malicious code.] ROI (return on investment) Role-based access control rootkit Rootkit revealers Rootkits Roundoff error Router access controls Routers Routing concepts RSA (Rivest-Shamir-Adelman) encryption cryptanalysis of cryptographic challenges description Euler totient function Jacobi function key choice mathematical foundations overview 2nd using the algorithm Rule-based ethics Rule-deontology Rules of evidence Rules of property Rules set, firewall Russian nuclear weapons, tracking |