Return-oriented attacks
Reverse engineering
Ring configuration
Ring topology
Risk
Risk acceptance
Risk aggregation
Risk analysis
Risk appetite
Risk assessment
Risk avoidance
Risk culture
Risk evaluation
Risk factor
Risk indicator
Risk management
Risk map
Risk mitigation
Risk owner
Risk portfolio view
Risk reduction
Risk response
Risk scenario
Risk sharing
Risk statement
Risk tolerance
Risk transfer
Risk treatment
Root cause analysis
Rootkit
Rotating standby
Rounding down
Router
RS-232 interface
RSA
Rulebase
Run instructions
Run-to-run totals