Acceptable interruption window
Acceptable use policy
Access Controls
Access path
Accountability
Action plan
Ad hoc
Administrative controls
Adware
Advance Encryption Standard (AES)
Algorithm
Anomaly-Base Detection
Annual Loss Expectation (ALE)
Alert situation
Alternate facilities
Alternate process
Anonymous File Transfer Protocol (AFTP)
Antivirus software
Application Programming Interface (API)
Application controls
Application layers
Application service provider (ASP)
Architecture
ARP (see also RARP)
Assurance
Asymmetric encryption
Attack Signature
Attributes
Audit
Audit Review
Audit trail
Authentication
Authorization
Automated Clearing House (ACH)
Availability
Awareness (Information Security)
Backup center
Biometrics
Business intelligence (BI)
Business impact assessment (BIA)
Baseline Security
Bastion Host
Business continuity management (BCM)
Business continuity planning (BCP)
Benchmarking
Business Impact Assessment (BIA)
Biometric
Bit-stream image
Bit copy
Bit
Blacklisting
Botnet
Boundary
Brute force attack
Business case
Business dependency assessment
Business impact analysis/assessment (BIA)
Business Model for Information Security (BMIS)
Byte
Capability Maturity Model (CMM)
Certificate
Certificate (Certification) Authority (CA)
Certificate policy (CP)
Certification Practice Statement
Certificate revocation list (CRL)
Chain of custody
Chain of Evidence
Challenge and Reply Authentication
Challenge-Response Protocol
Change management
Checksum
Cipher
Cipher-text
Chief executive officer (CEO)
Chief financial officer (CFO)
Chief information officer (CIO)
Chief information officer (CIO)
Chief information security officer (CISO)
Chief Operating Officer (COO)
Chief security officer (CSO)
Chief technology officer (CTO)
Acceptable interruption window
Acceptable use policy
Access path
Access rights
Accountability
Administrative control
Adware
Alert situation
Alternate facilities
Alternate process
Antivirus software
Application controls
Application layer
Application service provider (ASP)
Architecture
Benchmarking
Bit-stream image
Brute force attack
Business case
Business dependency assessment
Business impact analysis/assessment (BIA)
Chain of custody
Change management
Chief executive officer (CEO)
Chief financial officer (CFO)
Chief information officer (CIO)
Chief technology officer (CTO)
Cloud computing
Computer emergency response team (CERT)
Confidentiality
Control
Countermeasure
Criticality analysis
Cybercop
Damage evaluation
Data classification
Data Encryption Standard (DES)
Data leakage
Data normalization
Data warehouse
Decentralization
Decryption key
Defense in depth
The practice
Degauss
Denial-of-service attack (DoS)
Digital certificate
Digital code signing
Disaster recovery plan (DRP) desk checking
Disaster recovery plan (DRP)
Disaster recovery plan (DRP) walk-through