Glossary
Gateway (NIST)
Interface providing compatibility between networks by converting transmission speeds, protocols, codes, or security measures.
SOURCE: CNSSI-4009
Gateways
Points (network point, device, software, etc.) that act as an entrance to another point (network, computer, software application, etc.).
GETS
Government Emergency Telecommunications Service – A federal program by the National Communications System (NCS) that provides priority handling of phone calls placed over the public phone system during times of crisis.
GNOC
Global Network Operating Center – A Service used by AZNet to remotely monitor network devices throughout the State.
GOTS
Acronym for government-off-the-shelf application software, products developed for a government agency with funding and specifications from the agency that is made available to other government agencies. GOTS also includes technology/system transfers from other government agencies. The GOTS approach avoids creating custom developed software.
Governance
Ensures that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance against agreed-on direction and objectives.
SOURCE: ISACA
GOVERNANCE, RISK AND COMPLIANCE (GRC)
Governance, Risk, and Compliance is a term often used by management to acknowledge the interdependencies of these three disciplines in setting policy. See also GRC-SQ and Risk Management
SOURCE: Data Governance Institute
Governance, Risk Management, Compliance, Security and Data Quality (GRC-SQ)
Governance, Risk Management, Compliance, Security, and Data Quality is often used by Data Governance and Data Quality programs to acknowledge the interdependencies of these five disciplines in managing data.
SOURCE: Data Governance Institute
Graduated Security (NIST)
A security system that provides several levels (e.g., low, moderate, high) of protection based on threats, risks, available technology, support services, time, human concerns, and economics.
SOURCE: FIPS 201
Graphical User Interface (GUI)
A user environment that uses pictorial as well as textual representations of the input and the output of applications and the hierarchical or other data structure in which information is stored. Such conventions as buttons, icons, and windows are typical, and many actions are performed using a pointing device (such as a mouse).
Green Information Technologies
IT implementations that seek to be energy efficient and environmentally friendly/neutral.
Group Authenticator (NIST)
Used, sometimes in addition to a sign-on authenticator, to allow access to specific data or functions that may be shared by all members of a particular group.
SOURCE: CNSSI-4009
Guessing Entropy (NIST)
A measure of the difficulty that an Attacker has to guess the average password used in a system. In this document, entropy is stated in bits. When a password has n-bits of guessing entropy then an attacker has as much difficulty guessing the average password as in guessing an n-bit random quantity. The attacker is assumed to know the actual password frequency distribution.
SOURCE: SP 800-63