Sect. A

Abend
Acceptable interruption window [AIW]
Acceptable use policy [AUP]
Access control
Access control list [ACL]
Access control table
Access method
Access path
Access rights
Access server

 

Accountability
Accountability of governance
Accountable party
Acknowledgment [ACK]
Active recovery site (Mirrored)
Active response
Activity
Address
Address space
Addressing

 

Adjusting period
Administrative control
Advanced Encryption Standard [AES]
Advanced persistent threat [APT]
Adversary
Adware

 

 

 

 

 

Alert situation
Alignment
Allocation entry
Alpha
Alternate facilities
Alternate process
Alternative routing
"American Standard Code for Information
Interchange"
Amortization
Analog

 

Analytical technique
Anomaly
Anomaly detection
Anonymity
Antivirus software
Appearance
Appearance of independence
Applet
Application

 

 

 

Application acquisition review
Application architecture
Application benchmarking
Application controls
Application development review
Application implementation review
Application layer
Application maintenance review



Application or managed service provider [ASP/MSP]
Application program
Application programming
Application programming interface [API]
Application proxy
Application security
Application service provider [ASP]
Application software tracing and mapping

Application system
Architecture
Architecture board
Arithmetic logic unit [ALU]
Artificial intelligence
ASCII
Assembler
Assembly Language
Assertion
Assessment

 

 

 

Asset
Assurance
Assurance engagement
Assurance initiative
Asymmetric key (public key)
Asynchronous Transfer Mode [ATM]
Asynchronous transmission
Attack

 

 

Attack mechanism
Attack vector
Attenuation
Attest reporting engagement
Attitude
Attribute sampling
Audit
Audit accountability
Audit authority

 

 

 

Audit charter
Audit evidence
Audit expert systems
Audit objective
Audit plan
Audit program
Audit responsibility
Audit risk

 

 

 

 

 

Audit sampling
Audit subject matter risk
Audit trail
Audit universe
Auditability
Auditable unit

 

 

 

 

 

 

 



Auditor’s opinion
Authentication
Authenticity
Automated application controls
Availability
Awareness