Skip to main content
ADOA-ASET Logo
  • Home
  • About
    • Careers
    • Leadership Team
    • Statutes and Rules
    • Meeting Requests
  • Services
    • Current Rates
  • Strategy
    • ACT Recommendations
    • Digital Government
    • Enterprise Architecture
    • Enterprise Project Management Office
    • Strategic Oversight
    • Statewide Strategic IT Plans
  • Governance
    • IT Authorization Committee (ITAC)
    • Chief Information Officer (CIO) Council
    • Change Advisory Board (CAB)
    • Enterprise Security Program Advisory Council (ESPAC)
  • Programs
    • AZNET II - Arizona Network
    • Archived Programs
  • Resources
    • ASET Billing
    • Glossary
    • Policies, Standards and Procedures
    • Security
      • Incident Reporting
    • Service Desk
    • Training
    • Agency Engagement Manager List
  • Home
  • Resources
  • Glossary

Glossary

( (2) | A (142) | B (60) | C (158) | D (101) | E (54) | F (42) | G (13) | H (21) | I (120) | J (3) | K (8) | L (16) | M (39) | N (19) | O (16) | P (74) | Q (2) | R (52) | S (109) | T (47) | U (7) | V (14) | W (12) | Z (1)

Data (NIST)

A subset of information in an electronic format that allows it to be retrieved or transmitted.

SOURCE: CNSSI-4009

See information.

Data Aggregation

The ability to get a more complete picture of the information by analyzing several different types of records at once

Data Aggregation (NIST)

Compilation of individual data systems and data that could result in the totality of the information being classified, or classified at a higher level, or of beneficial use to an adversary.

SOURCE: CNSSI-4009

DATA ARCHITECTURE

A discipline, process, and program focusing on integrating sets of information. One of the four Enterprise Architectures (with Application Architecture, Business Architecture, and System Architecture). See also Data Modeling

SOURCE: Data Governance Institute

Data Asset (NIST)

1. Any entity that is comprised of data. For example, a database is a data asset that is comprised of data records. A data asset may be a system or application output file, database, document, or Web page. A data asset also includes a service that may be provided to access data from an application. For example, a service that returns individual records from a database would be a data asset. Similarly, a Web site that returns data in response to specific queries (e.g., www.weather.com) would be a data asset.

2. An information-based resource.

SOURCE: CNSSI-4009

Data classification

Data created, stored, processed or transmitted on state information systems is classified according to the impact to the state or citizens resulting from the disclosure, modification, breach or destruction of the data.

Data Classification Categories

All State of Arizona data is classified as Confidential Data or Public data.

Data Custodian

The entity currently using or manipulating the data, and therefore, temporarily taking responsibility for the data.

SOURCE: ADOA-ASET

Anyone with physical or operational control of a data repository, including, without limitation, roles such as database administrators, system or server administrators, backup operators and storage server administrators. 

SOURCE: Data Governance Institute

DATA DICTIONARY

A database about data and database structures. A catalog of all data elements, containing their names, structures, and information about their usage, for the benefit of programmers and others interested in the data elements and their usage.

SOURCE: Data Governance Institute

DATA ELEMENT

The smallest piece of information considered meaningful and usable. A single logical data fact, the basic building block of a Logical Data Model.

SOURCE: Data Governance Institute

Data Element (NIST)

A basic unit of information that has a unique meaning and subcategories (data items) of distinct value. Examples of data elements include gender, race, and geographic location.

SOURCE: SP 800-47; CNSSI-4009

Data Encryption Standard (DES) (NIST)

The DEA cryptographic engine that is used by the Triple Data Encryption Algorithm (TDEA).

SOURCE: SP 800-67

Data Exchange

The transfer of data between two points: a Producer, who creates or produces the data and transmits it, and a Consumer, who receives that data and imports it or consumes it. The Producer and Consumer can be an application, program, information system, agency, division, department, government or non-government entity.

Data Flow Control (NIST)

Synonymous with information flow control.

SOURCE: CNSSI-4009

Data Flow Diagram

A graphical depiction of the relationships among and between the various components and processes in a program or system. They depict how input data is transformed to output results through a sequence of functional transformations and consist of four major components - entities, processes, data stores, and data flows.

A DFD can be either logical or physical. A logical DFD focuses on the business processes surrounding the data flow. A physical DFD focuses on the implementation of the data flow and includes manual process details and data structures.

Data Governance

The exercise of authority, control and shared decision-making (planning, monitoring and enforcement) over the management of data assets.

SOURCE: DAMA DMBOK

A system of decision rights and accountabilities for information-related processes, executed according to agreed-upon models, which describe who can take what actions with what information, and when, under what circumstances, using what methods.

SOURCE: Data Governance Institute

DATA GOVERNANCE FRAMEWORK

A logical structure for organizing how we think about and communicate Data Governance concepts.

SOURCE: Data Governance Institute

DATA GOVERNANCE METHODOLOGY

A logical structure providing step-by-step instructions for performing Data Governance processes.

SOURCE: Data Governance Institute

DATA GOVERNANCE OFFICE (DGO)

A centralized organizational entity responsible for facilitating and coordinating Data Governance and/or Stewardship efforts for an organization. It supports a decision-making group, such as a Data Stewardship Council.

SOURCE: Data Governance Institute

Data Integrity

The assurance that information can only be accessed or modified by those authorized to do so. Data integrity can be maintained by the DBMS or maintained by the software application. Therefore, data integrity can be implemented inside the database and through data access rules. Data integrity includes the following:

  1. Entity integrity keeps duplicate records from being inserted in a table and is enforced through primary keys and normalized database designs.
  2. Domain integrity means that only valid values are entered into a field. It is enforced through foreign key constraints, column-level rules, or lookup tables.
  3. Referential integrity makes sure that no foreign keys point to records that do not exist. It is enforced using foreign key constraints.
  4. Business rules integrity applies additional rules to data as it specifically relates to the business. These rules may cross column, row, and even table or database boundaries.

Data Integrity (NIST)

The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing, and while in transit

SOURCE: SP 800-27

The property that data has not been changed, destroyed, or lost in an unauthorized or accidental manner.

SOURCE: CNSSI-4009

Data Interoperability

The degree to which data produced by an information system can be consumed by another information system.

Data Loss (NIST)

The exposure of proprietary, sensitive, or classified information through either data theft or data leakage.

SOURCE: SP 800-137

Data Loss Prevention (DLP)

A system that restricts the transmission of sensitive data, reducing the risk of suffering a breach.

SOURCE: VERIZON PCI SECURITY

DATA MANAGEMENT COMMITTEE

Stakeholder committee composed of management responsible for managing data assets in an organization and responsible for the development, documentation and implementation of data governance policies, standards and procedures.

SOURCE: Data Management Maturity Model V 1.0

DATA MAPPING

The process of assigning a source data element to a target data element.

SOURCE: Data Governance Institute

Data Mining

Data Mining is a technique used to analyze existing information, usually with the intention of pursuing new avenues to pursue business

Data Model

A representation of the structure, organization and interrelationships of data. A data model can be either physical or logical. A physical data model represents the physical structure of the data or database. A logical model articulates the business concepts behind the physical data.

Data Modeling

The analysis of data objects that are used in a business or other context and the identification of the relationships among these data objects.

SOURCE: ADOA-ASET

The discipline, process, and organizational group that conducts analysis of data objects used in a business or other context, entifies the relationships among these data objects, and creates models that depict those relationships. See also Data Model.

SOURCE: Data Governance Institute

Data Owner

Official responsible for the overall procurement, development, integration, modification, or operation and maintenance of data.

SOURCE: ADOA-ASET

Makes and enforces all decisions regarding data within their organization.  Ensures that business requirements are established, documented and communicated.

SOURCES: Data Management Maturity Model and CMMI

DATA POLICY COUNCIL

Stakeholder committee that includes business and technology representatives from each functional area responsible for ensuring that data management objectives, priorities and scope are defined and approved and that they reflect agency business objectives.

Source: Data Management Maturity Model V 1.0

DATA PRIVACY

The assurance that a person’s or organization’s personal and private information is not inappropriately disclosed. Ensuring Data Privacy requires Access Management, eSecurity, and other data protection efforts.

SOURCE: Data Governance Institute

DATA PROFILING

The systematic analysis of the content of a data source, from counting the bytes and checking cardinalities to the most thoughtful diagnosis of whether the data can meet the high level goals of a data warehouse.

SOURCE: The Kimball Group website

Data Security (NIST)

Protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure.

SOURCE: CNSSI-4009

DATA STAKEHOLDERS

Those who use, affect, or are affected by data. Data Stakeholders may be upstream producers, gatherers, or acquirers of information; downstream consumers of information, those who manage, transform, or store data, or those who set policies, standards, architectures, or other requirements or constraints.

SOURCE: Data Governance Institute

DATA STEWARD

A person with data-related responsibilities as set by a Data Governance or Data Stewardship program. Often, Data Stewards fall into multiple types. Data Quality Stewards, Data Definition Stewards, Data Usage Stewards, etc.

SOURCE: Data Governance Institute

Data Transfer Device (DTD) (NIST)

Fill device designed to securely store, transport, and transfer electronically both COMSEC and TRANSEC key, designed to be backward compatible with the previous generation of COMSEC common fill devices, and programmable to support modern mission systems.

SOURCE: CNSSI-4009

Data Warehousing

The consolidation of several previously independent databases into one location

Database Management System (DBMS)

A specially designed software application that interact with the user, other applications, and the database itself to capture and analyze data. A general-purpose DBMS is a software system designed to allow the definition, creation, querying, update, and administration of databases.

SOURCE: WIKIPEDIA

Database Management System (DBMS)

A set of computer programs with a user and/or programming interface that supports the definition of the format of a database, and the creation of and access to its data. A database management system removes the need for a user or program to manage low-level database storage. It also provides security for and assures the integrity of the data it contains. Types of database management systems are relational (table oriented) and object oriented.

Database Software

Commonly referred to as the systems used to organize and manage data storage, facilitate access to, provide security for, and assure the integrity of data stored in a database.

Databases

Collections of information organized so that contents can easily be accessed, managed, and updated. The most prevalent type of database is the relational database, a tabular database in which data is defined so that it can be reorganized and accessed in a number of different ways. A distributed database is one that can be dispersed or replicated among different points in a network. An object-oriented programming database is one that is congruent with the data defined in object classes and subclasses.

DB2®

A relational database management system (RDBMS) available for a variety of platforms and operating systems. DB2® supports native XML functionality and integrates with other major RDBMS products. DB2® supports parallel architectures, integrated object models, industry standard SQL, Open Database Connectivity (ODBC) interface, the Java Database Connectivity™ (JDBC) interface, or a CORBA interface broker.

Decertification (NIST)

Revocation of the certification of an information system item or equipment for cause.

SOURCE: CNSSI-4009

Decipher (NIST)

Convert enciphered text to plain text by means of a cryptographic system.

SOURCE: CNSSI-4009

DECISION RIGHTS

The system of determining who makes a decision, and when, and how, and under what circumstances. Formalizing Decision Rights is a key function of Data Governance.

SOURCE: Data Governance Institute

Declared Disaster

Disruption caused by a major hardware or software failure or destruction of facilities that is identified by the CIO or his/her designate and communicated to the BU staff

Decode (NIST)

Convert encoded text to plain text by means of a code.

SOURCE: CNSSI-4009

Decrypt (NIST)

Generic term encompassing decode and decipher.

SOURCE: CNSSI-4009

Decryption (NIST)

The process of transforming ciphertext into plaintext.

SOURCE: SP 800-67

The process of changing ciphertext into plaintext using a cryptographic algorithm and key.

SOURCE: SP 800-21

Conversion of ciphertext to plaintext through the use of a cryptographic algorithm.

SOURCE: FIPS 185

Dedicated Mode (NIST)

Information systems security mode of operation wherein each user, with direct or indirect access to the system, its peripherals, remote terminals, or remote hosts, has all of the following: 1. valid security clearance for all information within the system, 2. formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments, and/or special access programs), and 3. valid need- to-know for all information contained within the information system. When in the dedicated security mode, a system is specifically and exclusively dedicated to and controlled for the processing of one particular type or classification of information, either for full-time operation or for a specified period of time.

SOURCE: CNSSI-4009

Default Classification (NIST)

Classification reflecting the highest classification being processed in an information system. Default classification is included in the caution statement affixed to an object.

SOURCE: CNSSI-4009

Defense-in-Breadth (NIST)

A planned, systematic set of multidisciplinary activities that seek to identify, manage, and reduce risk of exploitable vulnerabilities at every stage of the system, network, or sub-component life cycle (system, network, or product design and development; manufacturing; packaging; assembly; system integration; distribution; operations; maintenance; and retirement).

SOURCE: CNSSI-4009

Defense-in-Depth (NIST)

Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and dimensions of the organization.

SOURCE: CNSSI-4009; SP 800-53

Degauss (NIST)

Procedure that reduces the magnetic flux to virtual zero by applying a reverse magnetizing field. Also called demagnetizing.

SOURCE: CNSSI-4009

Deleted File (NIST)

A file that has been logically, but not necessarily physically, erased from the operating system, perhaps to eliminate potentially incriminating evidence. Deleting files does not always necessarily eliminate the possibility of recovering all or part of the original data.

SOURCE: SP 800-72

Demilitarized Zone (DMZ) (NIST)

An interface on a routing firewall that is similar to the interfaces found on the firewall’s protected side. Traffic moving between the DMZ and other interfaces on the protected side of the firewall still goes through the firewall and can have firewall protection policies applied.

SOURCE: SP 800-41

A host or network segment inserted as a "neutral zone" between an organization’s private network and the Internet.

SOURCE: SP 800-45

Perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network’s Information Assurance policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks.

SOURCE: CNSSI-4009

Denial of Service (DoS) (NIST)

The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)

SOURCE: CNSSI-4009

Deny by Default / Allow by Exception

A firewall configuration policy that forces the user to register at the site, authenticate and authorize prior to gaining access.

SOURCE: SECUROSIS WEBSITE

Depth (NIST)

An attribute associated with an assessment method that addresses the rigor and level of detail associated with the application of the method. The values for the depth attribute, hierarchically from less depth to more depth, are basic, focused, and comprehensive.

SOURCE: SP 800-53A

DETECT (FUNCTION) (NIST)

Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.

SOURCE: NIST CYBERSECURITY FRAMEWORK

Deterministic Random Bit Generator (DRBG) (NIST)

A Random Bit Generator (RBG) that includes a DRBG mechanism and (at least initially) has access to a source of entropy input. The DRBG produces a sequence of bits from a secret initial value called a seed, along with other possible inputs. A DRBG is often called a Pseudorandom Number (or Bit) Generator.

SOURCE: SP 800-90A

Deterministic Random Bit Generator (DRBG) Mechanism (NIST)

The portion of an RBG that includes the functions necessary to instantiate and uninstantiate the RBG, generate pseudorandom bits, (optionally) reseed the RBG and test the health of the DRBG mechanism.

SOURCE: SP 800-90A

Device Distribution Profile (NIST)

An approval-based Access Control List (ACL) for a specific product that 1) names the user devices in a specific key management infrastructure (KMI) Operating Account (KOA) to which PRSNs distribute the product, and 2) states conditions of distribution for each device.

SOURCE: CNSSI-4009

Device Registration Manager (NIST)

The management role that is responsible for performing activities related to registering users that are devices.

SOURCE: CNSSI-4009

Diagnostic Ports

Ports, services and systems used for diagnostic, maintenance and monitoring activities for managing information system performance, function or capacity. Examples include: physical network switch diagnostic ports, logical management services such as SNMP and modems for remote maintenance.

Differential Power Analysis – (DPA) (NIST)

An analysis of the variations of the electrical power consumption of a cryptographic module, using advanced statistical methods and/or other techniques, for the purpose of extracting information correlated to cryptographic keys used in a cryptographic algorithm.

SOURCE: FIPS 140-2

Differentiated Services (DiffServ)

A computer networking architecture that specifies a simple, scalable and coarse-grained mechanism for classifying and managing network traffic and providing quality of service (QoS) on modern IP networks. DiffServ can, for example, be used to provide low-latency to critical network traffic such as voice or streaming media while providing simple best-effort service to non-critical services such as web traffic or file transfers.

SOURCE: WIKIPEDIA

Digital Evidence (NIST)

Electronic information stored or transferred in digital form.

SOURCE: SP 800-72

Digital Forensics (NIST)

The application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody for the data.

SOURCE: SP 800-86

Digital Signature (NIST)

An asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and non-repudiation.

SOURCE: SP 800-63

A nonforgeable transformation of data that allows the proof of the source (with non-repudiation) and the verification of the integrity of that data.

SOURCE: FIPS 196

The result of a cryptographic transformation of data which, when properly implemented, provides the services of:

1. origin authentication,

2. data integrity, and

3. signer non-repudiation.

SOURCE: FIPS 140-2

The result of a cryptographic transformation of data that, when properly implemented, provides a mechanism for verifying origin authentication, data integrity, and signatory non-repudiation.

SOURCE: FIPS 186-3

The result of a cryptographic transformation of data that, when properly implemented, provides origin authentication, data integrity, and signatory non-repudiation.

SOURCE: SP 800-89

Cryptographic process used to assure data object originator authenticity, data integrity, and time stamping for prevention of replay.

SOURCE: CNSSI-4009

Digital Signature Algorithm (DSA)

An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. The signature is computed using rules and parameters such that the identity of the signer and the integrity of the signed data can be verified

Digital signing

An attempt to mimic the offline act of a person applying their signature to a paper document. Involves applying a mathematical algorithm, usually stored on and as part of the users’ private key, to the contents of a body of text. This results in an encrypted version of the document (this is referred to as the 'digitally signed' document) that can only be decrypted by applying the user’s public key. (Also digitally signing, digital signature)

Digital Subscriber Line (DSL)

A public network technology that delivers high bandwidth over conventional copper wiring at limited distances. There are four types of DSL: ADSL, HDSL, SDSL, and VDSL. All are provisioned via modem pairs, with one modem located at a central office and the other at the customer site. Because most DSL technologies do not use the whole bandwidth of the twisted pair, there is room remaining for a voice channel.

Direct-attached Storage (DAS)

A digital storage system directly attached to a server or workstation, without a storage network in between.

SOURCE: WIKIPEDIA

Directory Access Protocol (DAP)

A protocol used between a Directory User Agent (DUA) (software that accesses the X.500 Directory Service on behalf of the directory user) and a Directory System Agent (DSA) (software that provides the X.500 Directory Service for a portion of the directory information base) in an X.500 directory system.

Disaster

1. A sudden, unplanned calamitous event causing great damage or loss. Any event that creates an inability on an organization's part to provide critical business functions for some predetermined period of time. Similar terms are business interruption, outage and catastrophe. 2. The period when organization management decides to divert from normal production responses and exercises its disaster recovery plan. Typically signifies the beginning of a move from a primary to an alternate location.

Disaster Recovery Plan (DRP) (NIST)

A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities.

SOURCE: SP 800-34

Management policy and procedures used to guide an enterprise response to a major loss of enterprise capability or damage to its facilities. The DRP is the second plan needed by the enterprise risk managers and is used when the enterprise must recover (at its original facilities) from a loss of capability over a period of hours or days.

See Continuity of Operations Plan and Contingency Plan.

SOURCE: CNSSI-4009

Discretionary Access Control (NIST)

The basis of this kind of security is that an individual user, or program operating on the user’s behalf, is allowed to specify explicitly the types of access other users (or programs executing on their behalf) may have to information under the user’s control.

SOURCE: FIPS 191

A means of restricting access to objects (e.g., files, data entities) based on the identity and need-to-know of subjects (e.g., users, processes) and/or groups to which the object belongs. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control).

SOURCE: CNSSI-4009

Disinfecting (NIST)

Removing malware from within a file.

SOURCE: GUIDE TO MALWARE INCIDENT PREVENTION AND HANDLING FOR DESKTOPS AND LAPTOPS

Removing malware from within a file.

SOURCE: GUIDE TO MALWARE INCIDENT PREVENTION AND HANDLING FOR DESKTOPS AND LAPTOPS

Disposition

The actions taken regarding information that is no longer needed to support on-going administrative and operational activities in accordance with an approved Records Management Schedule. Directions may include destroy, transfer to the government archives, transfer to inactive records storage space, or retain permanently in unit.

Disruption (NIST)

An unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time (e.g., minor or extended power outage, extended unavailable network, or equipment or facility damage or destruction).

SOURCE: CNSSI-4009

An unplanned event that causes an information system to be inoperable for a length of time (e.g., minor or extended power outage, extended unavailable network, or equipment or facility damage or destruction).

SOURCE: SP 800-34

Distributed Denial of Service – (DDoS) (NIST)

A Denial of Service technique that uses numerous hosts to perform the attack.

SOURCE: CNSSI-4009

DMT

Demand Management Team – The process used to manage telecommunications’ infrastructure investments for both the statewide enterprise and for large agency specific projects usually exceeding $25,000 in cost.

Document Imaging

An information technology category for systems capable of replicating documents commonly used in business. Document Imaging Systems can take many forms including microfilm, on demand printers, facsimile machines, copiers, document scanners, Computer Output Microfilm (COM) and archive writers.

Document Management System (DMS)

A computer system or set of computer programs used to track and store electronic document electronic document and/or images of paper documents.

Document Object Model (DOM)

An interface-oriented application programming interface that allows for navigation of the entire document as if it were a tree of node objects representing the document's contents.

SOURCE: WIKIPEDIA

Domain (NIST)

A set of subjects, their information objects, and a common security policy.

SOURCE: SP 800-27

An environment or context that includes a set of system resources and a set of system entities that have the right to access the resources as defined by a common security policy, security model, or security architecture. See Security Domain.

SOURCE: CNSSI-4009; SP 800-53; SP 800-37

Domain Name

A domain name locates an organization or other entity on the Internet. For example, the domain name "www . sans . org" locates an Internet address for "sans.org" at Internet point 199.0.0.2 and a particular host server named "www". The "org" part of the domain name reflects the purpose of the organization or entity (in this example, "organization") and is called the top-level domain name. The "sans" part of the domain name defines the organization or entity and together with the top-level is called the second-level domain name

Domain name system (DNS)

The way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember "handle" for an Internet address

Downtime

Elapsed time when a system is not operating correctly because of a disruption

DRP

Disaster Recovery Plan – An Annually updated plan that is produced by AZNet in cooperation with the Telecommunications Program Office (TPO) and state agencies. The DRP identifies the critical components and functions of each agency’s operations and the actions needed to restart operations, in a timely manner, in the event of a disaster.

Drupal

A free and open-source content management framework written in PHP and distributed under the GNU General Public License.[ It is used as a back-end framework for at least 2.1% of all websites worldwide ranging from personal blogs to corporate, political, and government sites including AZ.gov, whitehouse.gov and data.gov.uk. It is also used for knowledge management and business collaboration.

SOURCE: WIKIPEDIA

DSL

Digital Subscriber Line – A high speed digital data transmission over the internet using wires of a local telephone carrier network.

DSS/ADSS

Digital Switched Service and Advanced Digital Switched Service – A digital transport of voice services that utilizes trunking traveling a dedicated facility to the carrier local exchange network for fast, easy and reliable transmission.

Due Diligence

The requirement that organizations must develop and deploy a protection plan to prevent fraud, abuse, and additional deploy a means to detect them if they occur.

Dynamic Content

Information that changes, or has the potential to change, each time a viewer accesses a web page. This type of content is usually generated from a database rather than coded directly into an HTML page. Generating the content requires programming and, typically, database support.

Dynamic Host Configuration Protocol (DHCP)

A standardized networking protocol used on Internet Protocol (IP) networks for dynamically distributing network configuration parameters, such as IP addresses for interfaces and services. With DHCP, computers request IP addresses and networking parameters automatically from a DHCP server, reducing the need for a network administrator or a user to configure these settings manually.

SOURCE: WIKIPEDIA

Dynamic HTML (DHTML)

A collection of technologies used together to create interactive and animated web sites by using a combination of a static markup language (such as HTML), a client-side scripting language (such as JavaScript), a presentation definition language (such as CSS), and the Document Object Model.

SOURCE: WIKIPEDIA

Dynamic Link Library

A collection of small programs, any of which can be called when needed by a larger program that is running in the computer. The small program that lets the larger program communicate with a specific device such as a printer or scanner is often packaged as a DLL program (usually referred to as a DLL file)

Dynamic Routing Protocol

Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbor routers, is usually called a routing daemon. The routing daemon updates the kernel's routing table with information it receives from neighbor routers.

Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbor routers, is usually called a routing daemon. The routing daemon updates the kernel's routing table with information it receives from neighbor routers.

Resources

  • ASET Billing
  • Glossary
  • Policies, Standards and Procedures
  • Security
    • Incident Reporting
  • Service Desk
  • Training
  • Agency Engagement Manager List
LinkedIn Twitter YouTube This site (RSS)
Arizona State Seal
Contact Us
ADOA-ASET
100 N. 15th Avenue, Suite 400
Phoenix, AZ 85007
Find in Google Maps
Phone: 602.542.2250
Map Image

Footer Utility

  • Statewide Website Policies
  • Site Map
  • Meeting Requests