Rogue Access Point (AP) Attack: An access point that is installed on the network without the network administrator's knowledge
Rogue DHCP server attack: An attacker can hand out DHCP leases with whatever information they want by deploying a rogue DHCP server on your network, setting a gateway address or DNS server, that's actually a machine within their control
Root certificate authority: They are self signed because they are the start of the chain of trust, so there's no higher authority that can sign on their behalf
RSA: One of the first practical asymmetric cryptography systems to be developed, named for the initials of the three co-inventors: Ron Rivest, Adi Shamir and Leonard Adleman
S
Screen lock: A security feature that helps prevent unwanted access by creating an action you have to do to gain entry
Secure boot protocol: It uses public key cryptography to secure the encrypted elements of the boot process
Secure channel: It is provided by IPsec, which provides confidentiality, integrity, and authentication of data being passed
Secure element: It's a tamper resistant chip often embedded in the microprocessor or integrated into the mainboard of a mobile device
Secure Shell (SSH): A secure network protocol that uses encryption to allow access to a network service over unsecured networks
Security: It's all about determining risks or exposure understanding the likelihood of attacks; and designing defenses around these risks to minimize the impact of an attack
Security information and event management systems (SIEMS): Form of centralized logging for security administration purposes
Security keys: Small embedded cryptoprocessors, that have secure storage of asymmetric keys and additional slots to run embedded code