Proxy: Can be useful to protect client devices and their traffic. They also provide secure remote access without using a VPN
Pseudo-random: Something that isn't truly random
Public key authentication: A key pair is generated by the user who wants to authenticate
Public key signatures: Digital signature generated by composing the message and combining it with the private key
Q
R
RA (Registration Authority):It is responsible for verifying the identities of any entities requesting certificates to be signed and stored with the CA
Rainbow table attacks: To trade computational power for disk space by pre-computing the hashes and storing them in a table
Rainbow tables:A pre-computed table of all possible password values and their corresponding hashes
Random numbers: A very important concept in encryption because it avoids some kind of pattern that an adversary can discover through close observation and analysis of encrypted messages over time
Ransomware:A type of attack that holds your data or system hostage until you pay some sort of ransom
RC4 (Rivest Cipher 4): Asymmetric stream cipher that gained widespread adoption because of its simplicity and speed
Recoverability: How complicated and time-consuming the recovery effort will be
Remote attestation: The idea of a system authenticating its software and hardware configuration to a remote system
Remote Authentication Dial-in User Service (RADIUS):A protocol that provides AAA services for users on a network
Reverse proxy: A service that might appear to be a single server to external clients, but actually represents many servers living behind it
Risk: The possibility of suffering a loss in the event of an attack on the system