CWDS Glossary

The CWDS Glossary includes a List of Acronyms and defined terms captured from various models, reports, and other artifacts pertaining to the Child Welfare System – California Automated Response and Engagement System (CWS-CARES) Project. The Glossary standardizes terms used across the various project disciplines; each term is defined with its meaning specific to the project domain.

The State may update the CWDS Glossary at any time. Any questions please contact CWDS Communications.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Secure Sockets Layer (SSL)

An encryption -based Internet security protocol.

Security and Penetration Testing Services (SPTS)

Services to test the security of an IT system. A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture. These penetration tests are often carried out by ethical hackers. These in-house employees or third parties mimic the strategies and actions of an attacker in order to evaluate the hackability of an organization's computer systems, network or web applications. Organizations can also use pen testing to test their adherence to compliance regulations.

Security Assertion Markup Language (SAML)

An Extensible Markup Language (XML) standard that allows a user to log on once for affiliated but separate Web sites. SAML is designed for business-to-business (B2B) and business-to-consumer (B2C) transactions.

Security Incident Event Management (SIEM)

The process of identifying, monitoring, recording, and analyzing security events or incidents within a real-time IT environment.

Self Service

A type of electronic support that allows end users to use technology to access information and perform routine tasks without requiring the assistance of a live customer service representative.

Semantic Layer

A business representation of corporate data that helps end users access data using common business terms. It maps complex data into familiar business terms such as case, referral, or client to offer a unified, consolidated view of data across the organization. By using common business terms, rather than data language, to access, manipulate, and organize information, it simplifies the complexity of business data.

Sensitive Point

A property of one or more components (and/or component relationships) that is critical to achieve a particular quality attribute response (part of Architecture Tradeoff Analysis Method used in Architecture evaluation).

Sensitive Referrals/Cases

A sensitive referral or sensitive case is one that identifies a person and/or a situation when an in-person investigation or the delivery of service requires a higher level of security.

Server image

A copy of a server state, including the configuration, dependencies, data, software, etc.

Service and Support (S&S)

Functions intended to retain and extend customer relationships once a product or service is delivered.