АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ A-codeAbonent, subscriber, userAbove the application layer cryptographic mechanismAccessAccess controlAccess controlAccess control listAccess control mechanismAccess control mechanism, security policy realizationAccess control serviceAccess control, access managementAccess matrixAccess structureAccess to informationAccess tokenAccess typeAccidentAccountAccountabilityAccreditationAccreditationAcquirerAcquisitionActive adversaryActive adversaryActive attackActive auditActive monitoringActive threatActual level of trustAdaptive attackAdaptive chosen-ciphertext attackAdaptive chosen-plaintext attackAdaptive chosen-plaintext attackAdditional cryptographic mechanismsAdministrative regulationAdvanced electronic signatureAdvanced encryption standard (AES)Advanced persistent threat (APT)Adversarial tactics, techniques & common knowledge (Mitre Att&ck)AdversaryAdware, advertising-supported softwareAggregate signatureAgreementAI agentAI componentAnonymityAnonymizationAnonymized dataAnonymizerAnonymous signature schemeAnti-botAnti-virusAntivirusApplicationApplication controlApplication control default denyApplication cryptographic protocolApplication layer cryptographic mechanismApplication ownerApplication program interface (API)Application security auditApplication security control (ASC)Application security life cycle reference modelApplication security management process (ASMP)Application security verificationApplication serviceApplication service providerApplication service safety performanceApplication specific integrated circuit (ASIC)ArbiterArbitrated protocolArbitrationArtificial intelligence (AI)Artificial intelligence system, AI systemAssetAssuarance elementAssuranceAssurance levelAssurance methodAssurance, trustAsymmetric cryptosystem, public key cryptosystemAsymmetric encryption systemAttackAttackAttack on computer networkAttack on the cryptosystem (cryptographic mechanism)Attack on the protocolAttack potentialAttack surfaceAttack surface managementAttacker рotentialAttributeAttribute-based encryptionAuditAuditAudit logAudit timeAudit timeAudit trailAuditorAuthenticated communication channelAuthenticated data moduleAuthenticated encryptionAuthenticated encryption with associated dataAuthenticated key agreement protocolAuthenticationAuthentication codeAuthentication contextAuthentication context classAuthentication protocolAuthenticityAuthenticityAuthorised useAuthorizationAuthorization endpointAuthorization grantAuthorization serverAuthorized access to informationAutocorrelation testAutomated information system (AIS)Automated systemAutonomy, autonomousAvailabilityAvailability of information assets