CWDS Glossary

The CWDS Glossary includes a List of Acronyms and defined terms captured from various models, reports, and other artifacts pertaining to the Child Welfare System – California Automated Response and Engagement System (CWS-CARES) Project. The Glossary standardizes terms used across the various project disciplines; each term is defined with its meaning specific to the project domain.

The State may update the CWDS Glossary at any time. Any questions please contact CWDS Communications.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

SCRUM Master (CSM)

an entry-level certification aimed at providing professionals with an awareness of the methodologies and values of Scrum, including team performance, accountability, and iterative progress.

SDX Interface (SDX)

Provides information to the DHCS systems from the SSA on Supplemental Security Income (SSI) recipients. The information is provided on a daily basis.

Secure Email Gateway (SEG)

A solution that improves the protection of incoming and outgoing emails. It’s a product widely used by businesses and governments to block cyber threats, such as spam, phishing, BEC (Business Email Compromise), trojan, ransomware, and other types of malware.

Secure Hash Algorithm (SHA)

Part of state and federal requirements on securing data. The SHA works in conjunction with the System Security Plan (SSP). SHA (Secure Hash Algorithm) is a National Security Agency designed hash function used to secure data. The call out in the narrative of the SSP is to ensure that the system architect ensures that the version of SHA meets or exceeds current cryptographic security standards. SHA is a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS)

Secure Shell (SSH)

A cryptographic network protocol for operating network services securely over an unsecured network.

Secure Sockets Layer (SSL)

An encryption -based Internet security protocol.

Security and Penetration Testing Services (SPTS)

Services to test the security of an IT system. A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique organizations use to identify, test and highlight vulnerabilities in their security posture. These penetration tests are often carried out by ethical hackers. These in-house employees or third parties mimic the strategies and actions of an attacker in order to evaluate the hackability of an organization's computer systems, network or web applications. Organizations can also use pen testing to test their adherence to compliance regulations.

Security Assertion Markup Language (SAML)

An Extensible Markup Language (XML) standard that allows a user to log on once for affiliated but separate Web sites. SAML is designed for business-to-business (B2B) and business-to-consumer (B2C) transactions.

Security Incident Event Management (SIEM)

The process of identifying, monitoring, recording, and analyzing security events or incidents within a real-time IT environment.

Self Service

A type of electronic support that allows end users to use technology to access information and perform routine tasks without requiring the assistance of a live customer service representative.