Abend
Acceptable interruption window [AIW]
Acceptable use policy [AUP]
Access control
Access control list [ACL]
Access control table
Access method
Access path
Access rights
Access server
Accountability
Accountability of governance
Accountable party
Acknowledgment [ACK]
Active recovery site (Mirrored)
Active response
Activity
Address
Address space
Addressing
Adjusting period
Administrative control
Advanced Encryption Standard [AES]
Advanced persistent threat [APT]
Adversary
Adware
Alert situation
Alignment
Allocation entry
Alpha
Alternate facilities
Alternate process
Alternative routing
"American Standard Code for Information
Interchange"
Amortization
Analog
Analytical technique
Anomaly
Anomaly detection
Anonymity
Antivirus software
Appearance
Appearance of independence
Applet
Application
Application acquisition review
Application architecture
Application benchmarking
Application controls
Application development review
Application implementation review
Application layer
Application maintenance review
Application or managed service provider [ASP/MSP]
Application program
Application programming
Application programming interface [API]
Application proxy
Application security
Application service provider [ASP]
Application software tracing and mapping
Application system
Architecture
Architecture board
Arithmetic logic unit [ALU]
Artificial intelligence
ASCII
Assembler
Assembly Language
Assertion
Assessment
Asset
Assurance
Assurance engagement
Assurance initiative
Asymmetric key (public key)
Asynchronous Transfer Mode [ATM]
Asynchronous transmission
Attack
Attack mechanism
Attack vector
Attenuation
Attest reporting engagement
Attitude
Attribute sampling
Audit
Audit accountability
Audit authority
Audit charter
Audit evidence
Audit expert systems
Audit objective
Audit plan
Audit program
Audit responsibility
Audit risk
Audit sampling
Audit subject matter risk
Audit trail
Audit universe
Auditability
Auditable unit
Auditor’s opinion
Authentication
Authenticity
Automated application controls
Availability
Awareness