Skip to main content
ADOA-ASET Logo
  • Home
  • About
    • Careers
    • Leadership Team
    • Statutes and Rules
    • Meeting Requests
  • Services
    • Current Rates
  • Strategy
    • ACT Recommendations
    • Digital Government
    • Enterprise Architecture
    • Enterprise Project Management Office
    • Strategic Oversight
    • Statewide Strategic IT Plans
  • Governance
    • IT Authorization Committee (ITAC)
    • Chief Information Officer (CIO) Council
    • Change Advisory Board (CAB)
    • Enterprise Security Program Advisory Council (ESPAC)
  • Programs
    • AZNET II - Arizona Network
    • Archived Programs
  • Resources
    • ASET Billing
    • Glossary
    • Policies, Standards and Procedures
    • Security
      • Incident Reporting
    • Service Desk
    • Training
    • Agency Engagement Manager List
  • Home
  • Resources
  • Glossary

Glossary

( (2) | A (142) | B (60) | C (158) | D (101) | E (54) | F (42) | G (13) | H (21) | I (120) | J (3) | K (8) | L (16) | M (39) | N (19) | O (16) | P (74) | Q (2) | R (52) | S (109) | T (47) | U (7) | V (14) | W (12) | Z (1)

Gateway (NIST)

Interface providing compatibility between networks by converting transmission speeds, protocols, codes, or security measures.

SOURCE: CNSSI-4009

Gateways

Points (network point, device, software, etc.) that act as an entrance to another point (network, computer, software application, etc.).

GETS

Government Emergency Telecommunications Service – A federal program by the National Communications System (NCS) that provides priority handling of phone calls placed over the public phone system during times of crisis.

GNOC

Global Network Operating Center – A Service used by AZNet to remotely monitor network devices throughout the State.

GOTS

Acronym for government-off-the-shelf application software, products developed for a government agency with funding and specifications from the agency that is made available to other government agencies. GOTS also includes technology/system transfers from other government agencies. The GOTS approach avoids creating custom developed software.

Governance

Ensures that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance against agreed-on direction and objectives.

SOURCE: ISACA

GOVERNANCE, RISK AND COMPLIANCE (GRC)

Governance, Risk, and Compliance is a term often used by management to acknowledge the interdependencies of these three disciplines in setting policy. See also GRC-SQ and Risk Management

SOURCE: Data Governance Institute

Governance, Risk Management, Compliance, Security and Data Quality (GRC-SQ)

Governance, Risk Management, Compliance, Security, and Data Quality is often used by Data Governance and Data Quality programs to acknowledge the interdependencies of these five disciplines in managing data.

SOURCE: Data Governance Institute

Graduated Security (NIST)

A security system that provides several levels (e.g., low, moderate, high) of protection based on threats, risks, available technology, support services, time, human concerns, and economics.

SOURCE:  FIPS 201

Graphical User Interface (GUI)

A user environment that uses pictorial as well as textual representations of the input and the output of applications and the hierarchical or other data structure in which information is stored. Such conventions as buttons, icons, and windows are typical, and many actions are performed using a pointing device (such as a mouse).

Green Information Technologies

IT implementations that seek to be energy efficient and environmentally friendly/neutral.

Group Authenticator (NIST)

Used, sometimes in addition to a sign-on authenticator, to allow access to specific data or functions that may be shared by all members of a particular group.

SOURCE: CNSSI-4009

Guessing Entropy (NIST)

A measure of the difficulty that an Attacker has to guess the average password used in a system. In this document, entropy is stated in bits. When a password has n-bits of guessing entropy then an attacker has as much difficulty guessing the average password as in guessing an n-bit random quantity. The attacker is assumed to know the actual password frequency distribution.

SOURCE:  SP 800-63

Resources

  • ASET Billing
  • Glossary
  • Policies, Standards and Procedures
  • Security
    • Incident Reporting
  • Service Desk
  • Training
  • Agency Engagement Manager List
LinkedIn Twitter YouTube This site (RSS)
Arizona State Seal
Contact Us
ADOA-ASET
100 N. 15th Avenue, Suite 400
Phoenix, AZ 85007
Find in Google Maps
Phone: 602.542.2250
Map Image

Footer Utility

  • Statewide Website Policies
  • Site Map
  • Meeting Requests