АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Rainbow table attackRandom numberRandom number generatorRankRansomware attackRaw biometric sampleReactive monitoringRecoveringRecurrent neural network (RNN)Recurrent sequenceRedirectReference monitorReference monitor conceptReference validation mechanismRefresh tokenRegistration center, registration authorityReinforcement learning (RL)ReleaseReliabilityReliabilityRelying partyRemote access trojanRemote administration toolRemote code execution (RCE)Remote digital signaturesRepeated use of a key sequenceReplay attackRepudiationRequest objectRequirementResidual riskResilienceResourceResource ownerResource serverResponseResponsibilityRestricted accessRetrainingReviewRing signature schemeRiskRisk acceptanceRisk aggregationRisk aggregationRisk analysisRisk assessmentRisk attitudeRisk aversionRisk avoidanceRisk criteriaRisk descriptionRisk driverRisk evaluationRisk financingRisk identificationRisk managementRisk managementRisk management auditRisk management frameworkRisk management planRisk management policyRisk management processRisk management, risc controlRisk matrixRisk ownerRisk perceptionRisk profileRisk rankingRisk registerRisk reportingRisk retentionRisk sharingRisk sourceRisk toleranceRisk treatmentRisk treatmentRiskwareRobotRobot systemRobot system providerRobot use restrictionRobustnessRoleRootkitRoundRound keyRound keyRound, pass (of cryptographic protocol)RSA cryptosystemRSA encryption algorithmRun testRunning key ciphering, one-time padding