Menu

You are here

Home » Enterprise Technology Dictionary » Enterprise Technology Dictionary -- Letter I

Enterprise Technology Dictionary -- Letter I

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W

Identification and Authentication

Definition:
Defines the set of capabilities to support the management of permissions for logging onto a computer, application, service, or network; includes user management and role/privilege management. This includes Identification and Authentication for digital signatures
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Incident Response

Definition:
Defines the set of capabilities to provide active response and remediation to a security incident that has allowed unauthorized access to a government information system
Theme(s):
Technology Business Management, Enterprise Architecture, Information Security
Context:
IT Business Function

Independent Project Quality Assurance

Definition:

The work of one or more professionals responsible for monitoring and assessing the health and effectiveness of project management plans and processes as well as an overall assessment of a projects's short and longer term risks.  To preserve independence, the QA provider(s) report outside the project management organizational structure, generally to the project's Executive Sponsor and the State CIO.  In Washington state government, independent Project QA is considered different than product or technical quality assurance which might include testing and other independent verification and validation activities.

Theme(s):
Governance, Portfolio Management, Program and Project Management
Context:
Oversight, Project Management

Information Discovery

Definition:
Information Discovery consists of all activities used to obtain information that is not readily obtainable
Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence, Integration and Interoperability
Context:
IT Business Function

Information Exchange and Transformation

Definition:
Information Exchange and Transformation - The tools and systems used to search, link, analyze, share and transport information such as reports or critical mission data. Transformation includes the set of capabilities to support the removal of incorrect or unnecessary characters and data from a data source
Theme(s):
Technology Business Management, Enterprise Architecture, Business Intelligence, Integration and Interoperability
Context:
IT Business Function

Information Mapping / Taxonomy / Categorization

Definition:
Information Mapping/ Taxonomy/ Categorization defines the set of capabilities to support the creation and maintenance of relationships between data entities, naming standards and categorization and allow classification of data and information into specific layers or types to support an organization.
Theme(s):
Technology Business Management, Enterprise Architecture, Information Management, Business Intelligence
Context:
IT Business Function

Information Technology

Definition:

Per RCW 43.105.020, "Information technology" includes, but is not limited to, all electronic technology systems and services, automated information handling, system design and analysis, conversion of data, computer programming, information storage and retrieval, telecommunications, requisite system controls, simulation, electronic commerce, radio technologies, and all related interactions between people and machines.

Theme(s):
Technology Business Management, Governance, Enterprise Architecture, General IT, Information Security

Information Technology (IT) Assets

Definition:

The processes, procedures, systems, IT infrastructure, data, and communication capabilities that allow each agency to manage, store, and share information in pursuit of its business mission, including but not limited to:

  • Applications.
  • All data typically associated with IT systems regardless of source (agency, partner, customer, citizen, etc.). 
  • All data typically associated with IT systems regardless of the medium on which it resides (disc, tape, flash drive, cell phone, personal digital assistant, etc.).
  • End-user authentication systems.
  • Hardware (voice, video, radio transmitters and receivers, mainframes, servers, workstations, personal computers, laptops, and all end point equipment).
  • Software (operating systems, application software, middleware, microcode).
  • IT infrastructure (networks, connections, pathways, servers, wireless endpoints).
  • Services (data processing, telecommunications, office automation, and computerized information systems).
  • Telecommunications hardware, software, and networks.
  • Radio frequencies.
  • Data computing and telecommunications facilities.
  • Intelligent control systems such as video surveillance, HVAC, and physical security.
Theme(s):
General IT, Enterprise Architecture, Information Security, Portfolio Management, Infrastructure Management, Information Management, Technology Business Management, Disaster Recovery

Information Technology (IT) Infrastructure

Definition:

IT infrastructure consists of the equipment, systems, software, and services used in common across an organization, regardless of mission/program/project.  IT Infrastructure also serves as the foundation upon which mission/program/project-specific systems and capabilities are built.  Approaches to provisioning of IT infrastructure vary across organizations, but commonly include capabilities such as Domain Name Server (DNS), Wide Area Network (WAN), and employee locator systems. Additional common capabilities examples include IT security systems, servers, routers, workstations, networked Supervisory Control and Data Acquisition (SCADA) systems, and networked printers (multifunction devices).

Theme(s):
Infrastructure Management, Information Security, Enterprise Architecture, General IT

Information Technology (IT) Risk Assessment

Definition:

Risk assessment is a process by which to determine what IT Assets exist that require protection, and to understand and document potential risks from IT security failures that may cause loss of information confidentiality, integrity, or availability. The purpose of a risk assessment is to help management create appropriate strategies and controls for stewardship of information assets.

Theme(s):
Enterprise Architecture, Information Security
Context:
Information Security

Information Technology Project Assessment (ITPA)

Definition:

A tool to assist agencies and the Office of the Chief Information Officer to assess the cost, complexity, and statewide significance of an anticipated information technology project (RCW 43.105.245).

Theme(s):
Program and Project Management

Information Technology System

Definition:
A computer system or set of components for collecting, creating, storing, processing, and distributing/transmitting information, typically including hardware, infrastructure and software, system users, and the information and/or data itself. 
Theme(s):
General IT, Enterprise Architecture, Technology Business Management
Context:
Integration

Integration

Definition:
Technology-centric term primarily concerned with connecting IT systems.
Theme(s):
General IT, Integration and Interoperability
Context:
Integration

Integration Hub

Definition:
A flexible architectural pattern that allows for a reuse and reduction in the number of interfaces, reducing and/or eliminating point-to-point integration.  A hub also allows for centralization of data and functionality.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Integration Layer

Definition:
Provides a level of indirection between the consumer of functionality and its provider. A service consumer interacts with the service provider via the Integration Layer. Hence, each service interface is only exposed via the Integration Layer (e.g., ESB), never directly and point-to-point integration is done at the Integration Layer instead of consumers/requestors doing it themselves. Consumers and providers are decoupled; this decoupling allows integration of disparate systems into new solutions.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Integration Service Catalog

Definition:
A user-facing web interface that provides a list of available APIs and is a repository for: Documentation, Example requests and output, Specifications Interactive tools (test client) Terms of use Contact information
Synonyms:
Developer Portal, Interface Library
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Interface

Definition:
Shared boundary between two functional units, defined by various characteristics pertaining to the functions, physical interconnections, signal exchanges, and other characteristics, as appropriate.
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Interface Library

Definition:
A user-facing web interface that provides a list of available APIs and is a repository for: Documentation, Example requests and output, Specifications Interactive tools (test client) Terms of use Contact information
Synonyms:
Integration Service Catalog, Developer Portal
Theme(s):
Integration and Interoperability, Enterprise Architecture
Context:
Integration

Internal System or Network

Definition:

An IT system or network designed and intended for use only by state of Washington employees, contractors, and business partners.

Theme(s):
Enterprise Architecture, Information Security, Infrastructure Management, General IT

Interoperability

Definition:
A business-centric term regarding the interconnection of business processes. Imply exchanges between a range of products, or similar products from several different vendors, or even between past and future revisions of the same product. Interoperability may be developed post-facto, as a special measure between two products, while excluding the rest, by using Open standards.
Theme(s):
General IT, Integration and Interoperability, Enterprise Architecture
Context:
Integration

Intrusion Detection Systems

Definition:

Software and/or hardware designed to detect an attack on a network or computer system. A Network IDS (NIDS) is designed to support multiple hosts, whereas a Host IDS (HIDS) is set up to detect illegal actions within the host. Most IDS programs typically use signatures of known cracker attempts to signal an alert. Others look for deviations of the normal routine as indications of an attack.

Theme(s):
Information Security, Enterprise Architecture

Intrusion Prevention Systems

Definition:

Software and/or hardware designed to prevent an attack on a network or computer system. An IPS is a significant step beyond an IDS because it stops the attack from damaging or retrieving data. Whereas an IDS passively monitors traffic by sniffing packets off of a switch port, an IPS resides inline like a firewall, intercepting and forwarding packets. It can thus block attacks in real time.

Theme(s):
Information Security, Enterprise Architecture

Inventory Control

Definition:
Supervision and management of the supply, storage, and accessibility of items held in inventory to ensure an adequate supply of available material without excessive oversupply, back orders or stock outages
Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Inventory Management

Definition:

Inventory costs represent a substantial portion of the total cost of ownership for many organizations. Proper inventory management requires an investment of time and resources. Carrying insufficient inventory may have adverse mission impacts or consequences. Carrying too much inventory ties up capital, is usually inefficient, requires extra storage space, and for items with a limited shelf life may lead to costly disposal actions

Theme(s):
Enterprise Architecture, Administrative and Financial Systems
Context:
Business Functions

Issue Tracking

Definition:

Defines the set of capabilities to receive and track user-reported issues and problems in using IT systems, including help desk calls

Theme(s):
Technology Business Management, Enterprise Architecture, Customer Support
Context:
IT Business Function

IT Expenditures

Definition:

Within the TBM Program, the source financial information used for identifying IT expenditures is from the statewide Agency Financial Reporting System (AFRS) and based on these components:

New IT acquisitions (coded in AFRS as Project Type X)
IT maintenance and operations (coded in AFRS as Project Type Y)
Data processing services (AFRS Sub-Object EL)

NOTE: AFRS Sub-Object EL is defined in the OFM State Administrative and Accounting Manual (SAAM) 75.70.20 as “Charges by state agencies for information technology services. Examples include computing services, hosting services, network services, web services, statewide systems (AFRS, HRMS, etc.), and planning and policy assessment by agencies such as the Department Enterprise Services, the Office of Financial Management, Office of the Chief Information Officer and Consolidated Technology Services.”

Theme(s):
Technology Business Management, Portfolio Management

IT Infrastructure Maintenance

Definition:

IT Infrastructure Maintenance involves the planning, design, and maintenance of an IT Infrastructure to effectively support automated needs (i.e. platforms, networks, servers, printers, etc.).

Theme(s):
Technology Business Management, Enterprise Architecture, Infrastructure Management
Context:
IT Business Function

IT Resource Tower

Definition:

IT Resource Towers (ITRT) are functional IT groupings that can be used to benchmark to industry. They can be split into more granular ITRT Sub-Towers to gain visibility into specific functions within a tower.  They also map up to utilization data in Accelerators, as well as to Applications and Services. The translation of financial information into functional IT towers (ITRTs) involves mapping from Cost Centers, and combining GL, Labor and Asset allocations.

Theme(s):
Technology Business Management

IT Strategy and Innovation

Definition:

IT Strategy and Innovation includes all activities outside of normal Strategic Planning that focus on trying new approaches, new systems and thinking about/ planning IT investments in different ways.

Theme(s):
Technology Business Management, Enterprise Architecture, Portfolio Management
Context:
IT Business Function

IT System Development / Integration Support

Definition:

IT System Development / Integration Support includes the software services enabling elements of distributed business applications to interoperate and the software development necessary to facilitate such integration. These elements can share function, content, and communications across heterogeneous computing environments

Theme(s):
Technology Business Management, Enterprise Architecture, Integration and Interoperability