АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Abonent, subscriber, userAbove the application layer cryptographic mechanismAccessAccess controlAccess controlAccess control listAccess control mechanismAccess control mechanism, security policy realizationAccess control serviceAccess control, access managementAccess matrixAccess structureAccess to informationAccess typeAccountAccountabilityAccreditationAccreditationActive adversaryActive adversaryActive attackActive auditActive monitoringActive threatAdaptive attackAdaptive chosen-ciphertext attackAdaptive chosen-plaintext attackAdaptive chosen-plaintext attackAdditional cryptographic mechanismsAdministrative regulationAdvanced electronic signatureAdvanced encryption standard (AES)Advanced persistent threat (APT)AdversaryAdware, advertising-supported softwareAnonymityAnonymizerAnti-botAnti-virusAntivirusApplicationApplication controlApplication control default denyApplication cryptographic protocolApplication layer cryptographic mechanismArbiterArbitrated protocolArbitrationAssetAssuarance elementAssuranceAssuranceAttackAttack on computer networkAttack on the cryptosystem)Attack on the protocolAttack potentialAuditAudit logAudit trailAuthenticated communication channelAuthenticated key exchange, AKEAuthenticationAuthentication codeAuthenticityAuthorised useAuthorizationAuthorized access to informationAutocorrelation testAutomated information system (AIS)Automated systemAvailability