Sect. R


RACI chart
Radio wave interference
Random access memory [RAM]
Range check
Ransomware
Rapid application development
Real-time analysis
Real-time processing
Reasonable assurance
Reasonableness check

 

 

Reciprocal agreement
Record
Record, screen and report layouts
Recovery
Recovery action
Recovery point objective [RPO]
Recovery strategy
Recovery testing
Recovery time objective [RTO]
Redo logs

 

Redundancy check
Redundant Array of Inexpensive Disks [RAID]
Redundant site
Reengineering
Registered ports
Registration authority [RA]
Regression testing
Regulation
Regulatory requirements
Relational database management system [RDBMS]

Relevant audit evidence
Relevant information
Reliable audit evidence
Reliable information
Remediation
Remote access service [RAS]
Remote Authentication Dial-in User Service [RADIUS]
Remote job entry [RJE]

 

 

 

Remote procedure call [RPC]
Removable media
Repeaters
Replay
Replication
Repository
Representation
Repudiation

 

 

 

 

 

Reputation risk
Request for comments [RFC]
Request for proposal [RFP]
Requirements definition
Residual risk
Resilience
Resource
Resource optimization
Responsible
Return on investment [ROI]

 



Return-oriented attacks
Reverse engineering
Ring configuration
Ring topology
Risk
Risk acceptance
Risk aggregation
Risk analysis

Risk appetite
Risk assessment
Risk avoidance
Risk culture
Risk evaluation
Risk factor
Risk indicator
Risk management
Risk map
Risk mitigation

Risk owner
Risk portfolio view
Risk reduction
Risk response
Risk scenario
Risk sharing
Risk statement
Risk tolerance
Risk transfer
Risk treatment

Root cause analysis
Rootkit
Rotating standby
Rounding down
Router
RS-232 interface
RSA
Rulebase
Run instructions
Run-to-run totals