DOCUMENT
Glossary of Terms and Definitions Supporting Policies, Standards and Guidelines For Information Technology and Information Security
713 definitions by Georgia Technology Authority

AcceptanceAcceptance Criteria (Project)Access ControlAccess ManagementActive MonitoringActivityAgencyAgency Impact RatingAgency Project Request (APR)Agreed Service TimeAgreementAlertAnalytical ModelingApplication FTEApplication ManagementApplication or Application SoftwareApplication PortfolioApplication Portfolio ManagementApplication ProgramApplication Program InterfaceApplication Security PlanApplication SizingApproval / Authority to OperateApproveArchitectural Design (Hardware and Software)ArchitectureAssemblyAssetAsset ManagementAssumptionsAttributeAuthenticationAuthorizationAuthorization and Need-To-KnowAutomatic Call Distribution (ACD)AvailabilityAvailability ManagementAvailability Management Information System (AMIS)Availability PlanBack Out PlanBackupBalanced ScorecardBar ChartBaselineBasis of Estimate (BOE)BenchmarkBenchmarkingBest PracticesBoundary Protection (or Perimeter Defense)BudgetBuild EnvironmentBusinessBusiness AnalystBusiness Capacity Management (BCM)Business CaseBusiness Continuity Management (BCM)Business Continuity Plan (BCP)Business Continuity PlannerBusiness Impact Analysis (BIA)Business ObjectiveBusiness OperationsBusiness OwnerBusiness PerspectiveBusiness ProcessBusiness Relationship ManagementBusiness RequirementsBusiness ServiceBusiness UnitBusiness VisionCalendaringCalendar UnitCall CenterCall TypeCapabilityCapacityCapacity ManagementCapacity Management Information System (CMIS)Capacity PlanCapacity PlanningCategoryChangeChange Advisory Board (CAB)Change CaseChange ControlChange HistoryChange ManagementChange ModelChange RecordChange RequestChange ScheduleChange WindowChief Information Officer (CIO)CI TypeClientClosedClosureCommercial Off the Shelf (COTS)CommodityCommunication Software (Software Application Projects)ComplianceComponentComponent Capacity Management (CCM)Component CIComponent Failure Impact Analysis (CFIA)Computer Security Log ManagementConceptConcept Phase (Software Development Projects)Conceptual ArchitectureConceptual Project PlanningConcurrencyConfidentialityConfigurationConfiguration BaselineConfiguration ControlConfiguration IdentificationConfiguration Item (CI)Configuration ManagementConfiguration Management Database (CMDB)Configuration Management Plan (CMP)Configuration Management System (CMS)Configuration RecordConfiguration StructureContingency PlanContingency PlanningContinual Service Improvement (CSI)Continuity of Operations Plan (COOP)Continuous AvailabilityContinuous OperationContractContract AdministrationControlled InterfacesCore ProcessesCore ServiceCostCost Benefit AnalysisCost BudgetingCost EffectivenessCost of OperationCost Performance Index (CPI)Cost Variance (CV)CountermeasureCrisis ManagementCritical Business ApplicationCritical PartnerCritical Path Method (CPM)Critical Projects Review PanelCritical Success FactorsCryptographyCultureCurrent Finish DateCurrent Start DateCustomerCustomizationDashboardDataDatabaseDatabase AdministrationDatabase DesignData ClassificationData CustodianshipData OwnerData-SharingData StewardDefectDefense-In DepthDefinitive Media Library (DML)DeliverableDemand ManagementDemilitarized Zone (DMZ)DependencyDeployDeploymentDeployment CertificationDepreciationDesignDesign DocumentsDesign Phase (Software Application Projects)Detailed Project PlanningDetectionDeveloperDevelopmentDevelopment EnvironmentDiagnosisDiagnostic ScriptDisaster Recovery PlanDispositionDocumentation ManagementDo NothingDowntimeDriverDue Diligence and Due CareDurationEarly Finish Date (EF)Early Life SupportEarly Start DateEarned Value (EV)Economies of ScaleEffectivenessEfficiencyEffortElectronic Mail (Email)Electronic MediaElicitationEmail MessagesEmail SystemsEmergency ChangeEmergency Change Advisory Board (ECAB)Emergency Support Function (ESF)End UserEnterpriseEnterprise ApplicationEnterprise Application Integration (EAI)Enterprise ArchitectureEnterprise Information Integration (EII)Enterprise Operational Environment (EOE)Enterprise Performance Life Cycle (EPLC)Enterprise Performance Life Cycle (EPLC)Enterprise Program Management (EPM)Enterprise Resource Planning (ERP)Enterprise Technology ProgramEnvironmentErrorEscalationEstimateEstimate at Completion (EAC)Estimate to Complete (ETC)EstimationE-SurplusEthicsEvaluationEventEvent ManagementEvents of InterestExpanded Incident LifecycleFacilities ManagementFacilities Management Plan (FMP)FailureFast RecoveryFault ToleranceFederal Information Security Management Act (FISMA)Federal Work Authorization ProgramFinancial ClosureFinancial ManagementFIPS 140-2 Validated Cryptographic ModulesFirewallFirst-Line SupportFISMA-Based Security AssessmentFit for PurposeFIT-GAP AnalysisFixed Price or Lump Sum ContractsFloatFulfillmentFull Time Equivalent (FTE)FunctionFunctional EscalationFunctional RequirementsFunctional TestingGap AnalysisGovernanceGoverning bodyGradual RecoveryGuidelinesHardware Maintenance (Project-Related Operations)Help DeskHierarchic EscalationHigh AvailabilityHot StandbyICalendarIdentified for Preliminary PlanningIdentityIdentity and Access ManagementImmediate RecoveryImpactImpact StatementImplementationImportant Business ApplicationInappropriate UsageIncidentIncident ManagementIncident RecordIncident Response Plan (Security)Independent Project OversightIndependent Verification and Validation (IV&V)Information and/or Record Electronic DataInformation SecurityInformation Security GovernanceInformation Security InfrastructureInformation Security Management (ISM)Information Security Management System (ISMS)Information Security PolicyInformation SystemInformation System Security PlanInformation Technology Infrastructure Library (ITIL)Information Technology (IT)Information Technology Resources or IT ResourcesInfrastructure ServiceInitial Risk IdentificationInitiation StageInstallation and Checkout Phase (Software Application Projects)Intangible BenefitsIntangible CostsIntegration ManagementIntegration Testing (Software Application Projects)IntegrityInterfaces Design (Software Application Projects)Intermediate RecoveryInternet Protocol (IP)Internet Service Provider (ISP)InvestmentInvitation for Bids (IFB)IssueIT as a ServiceIT Contingency PlanningIT Governing BodyIT InfrastructureIT InvestmentIT OperationsIT ServiceIT Service Continuity Management (ITSCM)IT Service Continuity PlanIT Service Management (ITSM)IT Service ProviderIT Strategic PlanIT Strategic Planning (ITSP)IT SystemJob SchedulingKey Performance Indicator (KPI)Key StakeholdersKnowingly Accepted RisksKnown ErrorKnown Error Database (KEDB)Known Error RecordLagLate Finish Date (LF)Late Start Date (LS)LeadLeast Privilege or Principle of Least PrivilegeLegitimate Security IssueLessons LearnedLevel of Effort (LOE)LifecycleLife-Cycle CostLiveLive EnvironmentLocal Area Network (LAN)LogLog AnalysisLog ArchiveLogical AccessLogical RelationshipLog Management InfrastructureMaintainabilityMaintenanceMaintenance Control (Software Application Projects)Major IncidentMajor IT ProjectMalware, Malicious Code, Malicious SoftwareManaged ServicesManagement SystemMandatory ProjectsManual WorkaroundMaster ScheduleMatrix OrganizationMaturityMaturity LevelMean Time Between Failures (MTBF)Mean Time Between Service Incidents (MTBSI)Mean Time to Repair (MTTR)Mean Time to Restore Service (MTRS)Meta-ArchitectureMethodologyMetricMiddlewareMilestoneMission Critical Processes or FunctionsMission StatementMitigateMitigation PlanMobile ComputingModelModelingMonitor Control LoopMonitoringNet Present ValueNetwork ManagementNetwork Management ApplicationNetwork Management InformationNetwork Management ProtocolNetwork SessionNon-Functional RequirementNon-Major IT ProjectNon-Public State Information AssetsNon-RepudiationNon-State Technology DevicesOngoing Support CostOperateOperating SystemOperationOperational Level Agreement (OLA)Operational SystemOperations and Maintenance PhaseOptimizeOrganizational Breakdown Structure (OBS)Organizational Change Management (Projects)Organizational PlanningOutcomeOversight CommitteeParallel TestingPassive MonitoringPathPayback PeriodPercent Complete (PC)PerformancePerformance GapPerformance GoalPerformance ManagementPerformance MeasuresPerformance TestingPersonal Information, Personally Identifiable Information (PII)Physical AccessPilotPlanPlanned DowntimePlanned ValuePlanning ApprovalPlanning StagePlatform ArchitecturePlatformsPolicyPortfolioPortfolio ManagementPositive User IdentificationPost Implementation ReportPost-implementation Review (PIR)PredecessorPriorityPrivacy OfficerProactive MonitoringProactive Problem ManagementProblemProblem ManagementProblem RecordProcedureProcessProcess ControlProcess ManagementProcess ManagerProcess OwnerProcurementProcurement CostProductProduct Description StatementProduction SupportProduction SystemProgramProgram Code or Subprogram NameProgram Evaluation and Review Technique (PERT)Program ManagementProgram Management Office (PMO)Program Management Plan (PMP)Program ManagerProgress AnalysisProjectProject AdministrationProject AssuranceProject Business ObjectiveProject Change Request (PCR)Project CharterProject CloseProject Concept Document (PCD)Project CostProject DescriptionProject DurationProjected Service Outage (PSO)Project ExecutionProject Human Resource ManagementProject InitiationProject Life Cycle ManagementProject Management Body of Knowledge (PMBOK)Project Management Institute (PMI)Project Manager (or Project Management Officer)Project Measures of SuccessProject Office (PO)Project OversightProject PhaseProject PlanProject PlanningProject RepositoryProject Risk ManagementProject ScheduleProject Scope ManagementProject Status ReportProject Time ManagementProject Transition ChecklistProtocolQualificationQualification Phase (Software Application Projects)QualityQuality Assurance Plan (QAP)Quality Assurance (QA)Quality Control (QC)Quality ManagementQuality Management PlanQuality PlanningRACIReactive MonitoringReciprocal ArrangementRecordRecords ManagementRecovery OptionRecovery Point Objective (RPO)Recovery (Software Application Projects)Recovery Time Objective (RTO)RedundancyRegression Testing (Software Application Projects)RelationshipReleaseRelease and Deployment ManagementRelease IdentificationRelease ManagementRelease RecordRelease UnitReliabilityRemaining Duration (RD)RemediationRemote AccessRepairRequest for Change (RFC)Request for Estimate (RFE)Request For Information (RFI)Request for Proposals (RFP)Request for Qualified Contractors (RFQC)Request for Quotation (RFQ)Request FulfillmentRequirement(s)Requirements DocumentRequirements Phase (Software Application Projects)Requirements TracingResolutionResourceResource LevelingResponse TimeResponsibility Assignment Matrix (RAM)RestoreRetirementReturn On Investment (ROI)Return to NormalReviewRightsRiskRisk AcceptanceRisk AnalysisRisk AssessmentRisk Assessment Report (RAR)Risk AvoidanceRisk Based TestingRisk ControlRisk EventRisk IdentificationRisk ManagementRisk Management FrameworkRisk Management PlanRisk Management Report (RMR)Risk MitigationRisk StatementRoleRolloutRoot CauseRoot Cause Analysis (RCA)RunSAAS (Software as a Service)ScalabilitySchedule DevelopmentSchedule ManagementSchedule Performance Index (SPI)Schedule Variance (SV)ScopeScope ChangeScope CreepScope DefinitionScope ManagementScope PlanningScope StatementScope VerificationSecond-Line SupportSecurity BreachSecurity CategorizationSecurity IncidentSecurity Log InfrastructureSecurity Log ManagementSecurity ObjectiveSecurity ProgramServerService Acceptance Criteria (SAC)Service AssetService Asset and Configuration Management (SACM)Service Capacity Management (SCM)Service CatalogService ContractService DeskService HoursService Improvement Plan (SIP)Service (ITIL Term)Service LevelService Level Agreement (SLA)Service Level Management (SLM)Service Level Objective (SLO)Service Level Requirement (SLR)Service Level TargetService Maintenance ObjectiveService ProviderService ReportingService RequestServicesSingle Point of ContactSlackSlippageSoftwareSoftware ArchitectureSoftware Life CycleSole SourceSourcing AgencySpecificationSpecification DocumentsSponsoring AgencyStage DeliverablesStage Exit CriteriaStage Gate ReviewStakeholderStandardStandard ChangeStandbyState Critical Projects CommitteeState Information AssetsStatement of Work (SOW)Status ReportsSteering CommitteeStorage ManagementSuper UserSupplierSupport HoursSupportive Business ApplicationSystemSystem BoundarySystem IntegrationSystem LifecycleSystem MediaSystems AnalystSystem Security PlanSystems SoftwareSystem Testing ( Software Application Projects)Tangible BenefitsTangible CostsTaskTechnical SpecificationsTechnology Enterprise ManagementTechnology InfrastructureTechnology InvestmentsTechnology PortfolioTechnology Portfolio ManagementTelecommunicationsTelecommunications EquipmentTelecommunications ServicesTelework or TelecommuteTemplateTestTest EnvironmentTestingTest Phase (Software Application Projects)Test ScriptsTest Tools (Software Application Projects)The Senior Agency Information Security Officer (SAISO)Third-PartyThreatThresholdThroughputTimeframeTotal CostTotal Cost of Ownership (TCO)Training (Software Application Projects)Transformational ProjectsTriggersTriple ConstraintTrusted PartnerUnderpinning Contract (UC)Unit Testing (Software Application Projects)UrgencyUsabilityUse CaseUserUser Acceptance Testing (UAT)User Interface (Software Application Projects)User Profile (UP)ValidationVarianceVendor ManagementVerificationVerification and AuditVersionVulnerabilityW3CWarm StandbyWarrantyWebmasterWeb ServerWide Area Network (WAN)WintelWorkaroundWork Breakdown Structure (WBS)Workforce ManagementWork in Progress (WIP)Work PackageWorkstation
Loading conversations.
Date
2014-01-01
Related Entities