Find keyword or terms by letter

Click on a numbered or lettered box below to show list of keywords and terms.

  • IANA

    (Context: )

    Definition

    The central registry for various "assigned numbers": Internet Protocol parameters, such as port, protocol, and enterprise numbers; and options, codes, and types. The currently assigned values are listed in the "Assigned Numbers" document STD 2. To request a number assignment, e-mail <iana@isi.edu>.

  • Identified for Preliminary Planning (IPP)

    (Context: )

    Definition

    A project portfolio status for projects that address an agency business need, but which require additional effort by the agency or further review before the expenditure of funds will be authorized.

  • Immutability

    (Context: Software, Virtual Server)

    Definition

    Immutability means an unchangeable, constant form.  In the case of containers, this means that, once a container image has been constructed, and deployed into a registry for use, it cannot be altered, added to, or otherwise changed.  Every resource inside that container should be a read only resource.

    Immutability

  • Impact

    (Context: )

    Definition

    The loss or effect on the project, program, or enterprise if the risk occurs. Impact is one of the three attributes of a risk.

    SEI

  • Impact Statement

    (Context: )

    Definition

    A cause and effect report generated at the manager level to show the impact that new projects will have on current schedules and resources as they enter the work stream.

  • Implementation

    (Context: )

    Definition

    Occurs when products that have completed testing are moved into production or into their working environment. Normally used as a term on Information Technology projects.

  • Improve the Business

    (Context: )

    Definition

    A project portfolio category for projects that support business functionality, deliverables, or processes by enhancing existing assets. These projects can introduce new processes.

  • Inbound Connections

    (Context: Software, Virtual Server)

    Definition

    Inbound connections- These are defined as network connections made to the container and are initiated externally to the container.

    Inbound Connections

  • Incident

    (Context: )

    Definition

    An event which is not part of the standard operation of a service and which causes or may cause disruption to or a reduction in the quality of services and VITA and/or other customer productivity.

  • Incident Response Capability (IRC)

    (Context: )

    Definition

    The follow-up to an incident including reporting, responding and recovery procedures.

  • Incident Response Team

    (Context: )

    Definition

    An organization within an Agency constituted to monitor IT security threats and prepare for and respond to cyber-attacks.

  • Incremental Backup

    (Context: Software)

    Definition

    A backup that copies only data that was changed since the previous backup (full or incremental). Every subsequent backup will include only files that were changed since the most recent backup. Incremental backups require less storage space and network utilization.

    EA-Solution-Data-Availability-Requirements.pdf (virginia.gov)

  • Independent Project Oversight

    (Context: )

    Definition

    A process that employs a variety of quality control, inspection, test measurement, and other observation processes to ensure that project objectives are achieved in accordance with an approved plan. Project oversight is usually done by an independent entity (separate from the project team) trained or experienced in a variety of management and technical review methods. Project oversight includes both technical and management oversight.

  • Independent Verification and Validation (IV&V)

    (Context: )

    Definition

    A review (or audit) that is performed by an organization that is technically, managerially, and financially independent of the development organization. A quality assurance process carried out by an independent third party.

  • Industrial, Scientific and Medical (IMS)

    (Context: )

    Definition

    Radio spectrum bands can be used by anyone without a license. Multiple bands are set aside for this use. Some commonly used bands are 902 to 928MHz, 2.4 to 2.4835GHz, and 5.725 to 5.850GHz.

  • Inflation

    (Context: )

    Definition

    The proportionate rate of change in the general price level, as opposed to the proportionate increase in a specific price. Inflation is usually measured by a broad based price index, such as the implicit deflator for Gross Domestic Product or the Consumer Price Index.

    CCA

  • Information

    (Context: )

    Definition

    Data is unstructured, lacks context and may not be relevant to the recipient. When data is correctly organized, filtered and presented with context it can become  information because it then has "value" to the recipient.

    [Information is not data. Wikipedia, The Free Encyclopedia. Retrieved 21:33, January 25, 2006 from https://en.wikipedia.org.]

  • Information Security (IS) Policy

    (Context: )

    Definition

    A statement of the information security objectives of an organization, and what employees, contractors, vendors, business partners, and third parties of the organization must do to achieve these objectives.

  • Information Security Agreement (ISA)

    (Context: )

    Definition

    ISA is used to document the technical security requirements needed to protect the exchange sensitive data between two systems under the administrative control of two separate entities. The ISA documents and formalizes the interconnection arrangements between "Organization A" and "Organization B". The ISA is used to specify any details that may be required to provide overall security safeguards for the systems being interconnected. A system that is approved by an ISA for interconnection with one organization's system should meet the protection requirements equal to, or greater than, those implemented by the other organization's system.

  • Information Security Breach

    (Context: )

    Definition

    The violation of an explicit or implied security policy that compromises the integrity, availability, or confidentiality of an information system or data.

  • Information Security Controls

    (Context: )

    Definition

    The protection mechanisms prescribed to meet the security requirements specified for an IT system.

  • Information Security Incident

    (Context: )

    Definition

    An adverse event or situation, whether intentional or accidental, that poses a threat to the integrity, availability, or confidentiality of an IT system.

    Report a Cyber Incident

  • Information Security Incident Response Team

    (Context: )

    Definition

    An organization within an agency constituted to monitor information security threats and prepare for and respond to cyber attacks. See also Computer Emergency Response Team Coordination Center (CERT/CC) and United States Computer Emergency Response Team (US-CERT).

  • Information Security Logging

    (Context: )

    Definition

    Chronological recording of system activities sufficient to enable the reconstruction, review, and examination of the sequence of events and activities surrounding or leading to an operation, a procedure, or an event in a transaction from its inception to its final results.

  • Information Security Officer (ISO)

    (Context: )

    Definition

    The individual designated by the Agency Head to be responsible for the development, implementation, oversight, and maintenance of the agency's information security program.

  • Information Security Program

    (Context: )

    Definition

    A collection of security processes, standards, rules, and procedures that represents the implementation of an organization's security policy.

  • Information Security Requirements

    (Context: )

    Definition

    The types and levels of protection necessary to adequately secure a system or data.

  • Information Security Safeguards

    (Context: )

    Definition

    The protection mechanisms prescribed to meet the security requirements specified for an IT system.

  • Information Security Standards

    (Context: )

    Definition

    Detailed statements of how employees, contractors, vendors, business partners, and third parties of an organization must comply with its information security policy.

  • Information System

    (Context: )

    Definition

    The organized collection, processing, transmission, and dissemination of information in accordance with defined procedures, whether automated or manual. Information systems include non-financial, financial, and mixed systems.

    GAO

  • Information Technology (IT)

    (Context: )

    Definition

    The hardware and software operated by an organization to support the flow or processing of information in support of business activities, regardless of the technology involved, whether computers, telecommunications, or other. In the Commonwealth of Virginia, Information Technology means telecommunications, automated data processing, databases, the Internet, management information systems, and related information, equipment, goods, and services.

  • Information Technology (IT) Asset

    (Context: )

    Definition

    Technology component of a business-driven process used to support the flow or processing of information (i.e. automated applications, information technology facilities, data, digital and paper records, IT infrastructure, IT human resources, etc.)

  • Information Technology (IT) Contingency Planning

    (Context: )

    Definition

    The component of Continuity of Operations Planning that prepares for continuity and/or recovery of an organization's IT systems and data that support its essential business functions in the event of a business interruption or threat of interruption.

  • Information Technology (IT) Portfolio Management

    (Context: )

    Definition

    A management process used to identify (pre-select), select, control, and evaluate investments within and across asset and project portfolios. The primary focus of IT portfolio management is to ensure alignment between business goals and IT investments.

  • Information Technology (IT) Security

    (Context: )

    Definition

    The protection afforded to IT systems and data in order to preserve their availability, integrity, and confidentiality.

  • Information Technology (IT) Security Architecture

    (Context: )

    Definition

    The logical and physical security infrastructure made up of products, functions, locations, resources, protocols, formats, operational sequences, administrative and technical security controls, etc., designed to provide the appropriate level of protection for IT systems and data.

  • Information Technology (IT) Security Audit

    (Context: )

    Definition

    The examination and assessment of the adequacy of IT system controls and compliance with established information security policy and procedures.

  • Information Technology (IT) Security Auditor

    (Context: )

    Definition

    CISO personnel, agency Internal Auditors, the Auditor of Public Accounts, or a private firm that, in the judgment of the agency, has the experience and expertise required to perform IT security audits.

  • Information Technology (IT) Security Breach

    (Context: )

    Definition

    The violation of an explicit or implied security policy that compromises the integrity, availability, or confidentiality of an IT system.

  • Information Technology (IT) Security Controls

    (Context: )

    Definition

    The protection mechanisms prescribed to meet the security requirements specified for an IT system.

  • Information Technology (IT) Security Incident

    (Context: )

    Definition

    An adverse event or situation, whether intentional or accidental, that poses a threat to the integrity, availability, or confidentiality of an IT system.

  • Information Technology (IT) Security Requirements

    (Context: )

    Definition

    The types and levels of protection necessary to adequately secure an IT system.

  • Information Technology (IT) Security Safeguards

    (Context: )

    Definition

    The protection mechanisms prescribed to meet the security requirements specified for an IT system.

  • Information Technology (IT) Strategic Plan

    (Context: )

    Definition

    A document which aligns IT strategy and investments with organizational business priorities, goals, and objectives.

  • Information Technology (IT) Strategic Planning (ITSP)

    (Context: Technology Management)

    Definition

    An ITIM-based planning methodology that looks at IT resources and projects as capital investments and forms a foundation for the selection, control and evaluation of IT resources and projects as part of a business-driven technology portfolio.

  • Information Technology (IT) Support Services

    (Context: )

    Definition

    IT support services is a range of services providing assistance with technology products such as mobile phones, computers, or other electronic or mechanical goods. In general, technical support services attempt to help the user solve specific problems with a product rather than providing training, customization, or other support services.

  • Information Technology (IT) System

    (Context: )

    Definition

    An interconnected set of IT resources under the same direct management control. See also Application System and Support System.

  • Information Technology (IT) System Sensitivity

    (Context: )

    Definition

     Information Technology (IT) System Sensitivity

  • Information Technology (IT) System Users

    (Context: )

    Definition

    As used in this document, a term that includes COV employees, contractors, vendors, third- party providers, and any other authorized users of IT systems, applications, telecommunication networks, data, and related resources.

  • Information Technology Infrastructure Library (ITIL)

    (Context: )

    Definition

    A framework of best practice processes designed to facilitate the delivery of high quality information technology (IT) services. A publication developed by the Central Computer and     Telecommunications Agency (CCTA) of the Office of Government Commerce (OGC) of the United Kingdom which documents best practices and a comprehensive process model for IT service management.

  • Information Technology Investment Management (ITIM)

    (Context: )

    Definition

    A management process that provides for the identification (pre-selection), selection, control, and evaluation of (business driven) IT investments across the investment lifecycle. ITIM uses structured processes to minimize risks and maximize return on investments. ITIM is the basis for the Commonwealth’s approach to technology management in the Commonwealth Technology Management Policy.

  • Information Technology Resource Management (ITRM)

    (Context: )

    Definition

    Identifier used to indicate official IT policies, standards, and guidelines permitted by the Virginia General Assembly for the control and management of IT resources in the Commonwealth.

  • Infrared

    (Context: )

    Definition

    Electromagnetic waves in the frequency range just below visible light corresponding to radiated heat.

  • Infrastructure as a Service (IaaS)

    (Context: )

    Definition

    The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).

  • Initial Risk Identification

    (Context: )

    Definition

    The process during the initial concept phase of identifying risks that might impact a project. The risk identification process is recommended for agencies to evaluate a project.

  • Initiating Processes

    (Context: )

    Definition

    Those processes performed to authorize and define the scope of a new phase or project or that can result in the continuation of halted project work.

    PMBOK

  • Instant Access

    (Context: Software)

    Definition

    The ability to boot a VM directly from the Data Domain appliance, to decrease downtime and provide efficient backup validation.

    EA-Solution-Data-Availability-Requirements.pdf (virginia.gov)

  • Institute of Electrical and Electronics Engineers (IEEE)

    (Context: )

    Definition

    A technical professional organization that advances technology.

    https://www.ieee.org/

  • Intangible Benefits

    (Context: )

    Definition

    Benefits that are difficult to measure and quantify. Intangible benefits include such things as customer retention, employee retention, and improved customer service.

  • Intangible Costs

    (Context: )

    Definition

    Costs that are difficult to measure and quantify. Intangible costs include such things as lost performance and efficiency while the users are getting acquainted with the new system.

  • Integrated Services Digital Network (ISDN)

    (Context: )

    Definition

    A set of communications standards allowing a single wire or optical fiber to carry voice, digital network services and video.

  • Integrity

    (Context: )

    Definition

    The protection of data or information systems from intentional or accidental unauthorized modification.

  • Interconnection Security Agreement

    (Context: )

    Definition

    An agreement established between the organizations that own and operate connected IT systems to document the technical and security requirements of the interconnection.

  • Interface Definition Language (IDL)

    (Context: )

    Definition

    Interface Definition Language defined by OMG is a language for describing the interfaces of software objects. Various Vendors have their own version of IDL (e.g., MIDL by Microsoft). 

  • Internal IT System

    (Context: )

    Definition

    An IT system designed and intended for use only by COV employees, contractors, and business partners. See also IT System and External IT System.

  • Internal IT System User

    (Context: )

    Definition

    A member of the agency workforce who uses an IT system in any capacity to perform the duties of their position.

  • Internal Network

    (Context: )

    Definition

    An internal network is a private computer network used to securely share any part of an organization's information or operational systems with its employees.

  • Internal Standard

    (Context: )

    Definition

    Context: (Commonwealth Data Management Program). A standard defined by one or more Commonwealth agencies where external standards do not exist and approved by the Secretary of Administration.

  • International Mobile Equipment Identity (IMEI)

    (Context: Technology Management)

    Definition

    A number, usually unique, to identify 3GPP and iDEN mobile phones, as well as some satellite phones. It is usually found printed inside the battery compartment of the phone but can also be displayed on-screen on most phones by entering *#06# MMI Supplementary Service code on the dialpad, or alongside other system information in the settings menu on smartphone operating systems.

    https://www.vita.virginia.gov/media/vitavirginiagov/it-governance/ea/pdf/Event-Log-Management.pdf 

  • International Mobile Subscriber Identity (IMSI)

    (Context: Technology Management)

    Definition

    A number that uniquely identifies every user of a cellular network. It is stored as a 64-bit field and is sent by the mobile device to the network. It is also used for acquiring other details of the mobile in the home location register (HLR) or as locally copied in the visitor location register.

    https://www.vita.virginia.gov/media/vitavirginiagov/it-governance/ea/pdf/Event-Log-Management.pdf 

  • International Telecommunication Union (ITU)

    (Context: )

    Definition

    An intergovernmental organization through which public and private organizations develop telecommunications.

  • Internet

    (Context: )

    Definition

    An external worldwide public data network using Internet protocols to which COV can establish connections.

  • Internet Engineering Taskforce (IETF)

    (Context: )

    Definition

    Internet Engineering Taskforce. A standards group that works on Internet architectural issues. 

  • Internet Message Access Protocol (IMAP)

    (Context: )

    Definition

    Internet Message Access Protocol. It permits a "client" email program to access remote message stores as if they were local.

  • Internet Protocol (IP)

    (Context: )

    Definition

    A network addressing protocol. Two versions are defined: IPv4 and IPv6. A communications protocol, which routes packets of data from one address on the Internet to another. IPv4 routes each packet based on a 32-bit destination address called an IP address (e.g., 123.122.211.111).

  • Interoperability

    (Context: )

    Definition

    Interoperability is the ability of health information system to work  together within and across organizational boundaries, in order to  advance the effective delivery of health care for individuals and communities

  • Intranet

    (Context: )

    Definition

    A trusted multi-function (data, voice, video, image, facsimile, etc.) private digital network using Internet protocols, which can be developed, operated and maintained for the conduct of COV business.

  • Intrusion Detection

    (Context: )

    Definition

    A method of monitoring traffic on the network to detect break-ins or break-in attempts, either manually or via software expert systems.

  • Intrusion Detection Systems (IDS)

    (Context: )

    Definition

    Software that detects an attack on a network or computer system. A Network IDS (NIDS) is designed to support multiple hosts, whereas a Host IDS (HIDS) is set up to detect illegal actions within the host. Most IDS programs typically use signatures of known cracker attempts to signal an alert. Others look for deviations of the normal routine as indications of an attack.

  • Intrusion Prevention Systems (IPS)

    (Context: )

    Definition

    Software that prevents an attack on a network or computer system. An IPS is a significant step beyond an IDS (intrusion detection system), because it stops the attack from damaging or retrieving data. Whereas an IDS passively monitors traffic by sniffing packets off of a switch port, an IPS resides inline like a firewall, intercepting and forwarding packets. It can thus block attacks in real time.

  • Investment Business Case

    (Context: )

    Definition

    A justification for a potential IT project used to determine investment priority.

  • Invitation for Bids (IFB)

    (Context: )

    Definition

    A document, containing or incorporating by reference the specifications or scope of work and all contractual terms and conditions, that is used to solicit written bids for a specific requirement for goods or nonprofessional services. This type of solicitation is also referred to as an Invitation to Bid. (DGS, APSPM)

  • IP Multimedia Subsystem (IMS)

    (Context: )

    Definition

    A next-generation network for carriers from the 3GPP that uses the IP protocol as its foundation. IMS supports data, video, SIP-based voice over IP (VoIP) and non-SIP packetized voice, such as H.323 and MGCP. IMS was designed to integrate with the PSTN and provide traditional telephony services such as 800 numbers, caller ID and local number portability. (Adapted from PCMag.com).

  • IPv4

    (Context: )

    Definition

    Four octets 32 bit IP address in the form 255.255.255.255

    What is the difference between IPv4 and IPv6?

  • IPv6

    (Context: )

    Definition

    Sixteen octets 128 bit IP address.

    What is the difference between IPv4 and IPv6?

  • ISO/IEC

    (Context: )

    Definition

    A series of IT security standards published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), providing best practice recommendations on IT security management for use by those who are responsible for initiating, implementing or maintaining information security management systems.