Security Glossary
A comprehensive dictionary of 50+ web security terms, explained for developers. Because understanding the threat is the first step to neutralising it.
XSS
Risk: HighCross-Site Scripting
An attacker injects malicious client-side scripts into a webpage. When other users view the page, the script executes in their browser, allowing the attacker to steal cookies or perform phishing.
CSRF
Risk: HighCross-Site Request Forgery
Inducing an authenticated user to unknowingly send unintended requests to a trusted website by leveraging the user's active session credentials.
SQL Injection
Risk: CriticalSQL Injection
Inserting malicious SQL statements into web form inputs or query strings to manipulate the back-end database query logic.
JWT
Risk: MediumJSON Web Token
An open standard (RFC 7519) used for securely transmitting information between parties as a JSON object.
HSTS
Risk: LowHTTP Strict Transport Security
A security mechanism that informs browsers via a response header to only interact with the site using HTTPS, prohibiting insecure HTTP connections.
CSP
Risk: LowContent Security Policy
An added layer of security that allows website administrators to declare which external resources (JS, CSS, images) are permitted to load and execute.
Salting
Risk: LowSalting
Adding a unique random string to a plaintext password before hashing it to defend against rainbow table attacks.
Pepper
Risk: LowPepper
Similar to salting, but a 'pepper' is usually a global secret stored in code or a hardware security module rather than the database.
IDOR
Risk: HighInsecure Direct Object Reference
A vulnerability where an application allows users to access unauthorized data by modifying identifiers (such as IDs) in a request.
SSRF
Risk: HighServer-Side Request Forgery
A vulnerability where an attacker induces a server-side application to make requests to an arbitrary URL of the attacker's choosing.
CORS
Risk: MediumCross-Origin Resource Sharing
A mechanism that uses HTTP headers to tell browsers to give a web application running at one origin access to selected resources from a different origin.
Path Traversal
Risk: HighPath Traversal
Exploiting insufficient input validation to access files and directories outside the web root folder using characters like '../'.
Clickjacking
Risk: MediumClickjacking
Using transparent layers or iframes to overlay a webpage, tricking users into clicking hidden buttons or links.
SameSite Cookie
Risk: LowSameSite Attribute
A cookie attribute used to control whether cookies are sent with cross-site requests, primarily to mitigate CSRF.
HttpOnly Cookie
Risk: LowHttpOnly Attribute
An attribute that prevents client-side scripts (like JavaScript) from accessing cookies, mitigating session theft via XSS.
Secure Cookie
Risk: LowSecure Attribute
A cookie attribute that ensures the cookie is only transmitted over encrypted HTTPS connections.
Rate Limiting
Risk: MediumRate Limiting
Restricting the number of requests a user or IP address can make within a specific timeframe.
Brute Force
Risk: HighBrute Force Attack
An attempt to gain access by systematically trying all possible combinations of passwords or codes.
Credential Stuffing
Risk: HighCredential Stuffing
A type of attack where stolen account credentials from one platform are used to gain unauthorized access to other systems.
Session Hijacking
Risk: HighSession Hijacking
An attack where the attacker gains unauthorized access to information or services by stealing or predicting a valid Session ID.
Session Fixation
Risk: MediumSession Fixation
An attack where the attacker provides a valid Session ID to a victim and induces them to log in with it, thereby gaining control over the session.
OAuth 2.0
Risk: MediumAuthorization Framework
An authorization protocol that allows third-party applications to obtain limited access to user resources on another service without sharing the password.
OIDC
Risk: MediumOpenID Connect
An identity layer built on top of the OAuth 2.0 protocol used to verify the identity of the end-user.
RBAC
Risk: LowRole-Based Access Control
A method of regulating access to resources based on the roles of individual users within an organization.
ABAC
Risk: LowAttribute-Based Access Control
An authorization model that provides access based on attributes of the user, the resource, and the environment.
MFA/2FA
Risk: LowMulti-Factor Authentication
A security process that requires users to provide two or more different factors to verify their identity.
Hashing
Risk: MediumHashing
A one-way function that converts input of any length into a fixed-length output string, which is irreversible.
Rainbow Table
Risk: HighRainbow Table
A precomputed table for reversing cryptographic hash functions, usually for cracking password hashes.
AES
Risk: LowAdvanced Encryption Standard
A symmetric encryption algorithm standard where the same key is used for both encryption and decryption.
RSA
Risk: LowAsymmetric Encryption Algorithm
An asymmetric encryption algorithm that uses a public key for encryption and a private key for decryption.
TLS
Risk: LowTransport Layer Security
A protocol that provides authentication and data encryption between different endpoints.
SRI
Risk: LowSubresource Integrity
A security feature that enables browsers to verify that resources they fetch (for example, from a CDN) are delivered without unexpected manipulation.
X-Frame-Options
Risk: LowX-Frame-Options Header
An HTTP response header used to indicate whether a browser should be allowed to render a page in a frame, iframe, or object.
X-Content-Type-Options
Risk: LowX-Content-Type-Options Header
A header used by the server to prevent the browser from 'guessing' the MIME type of a file (MIME sniffing).
WAF
Risk: LowWeb Application Firewall
A firewall that monitors and filters HTTP traffic between a web application and the internet to protect against attacks like SQLi and XSS.
IDS/IPS
Risk: LowIntrusion Detection/Prevention System
IDS monitors network traffic for suspicious activity; IPS blocks suspicious activity when it is discovered.
Captcha
Risk: LowCAPTCHA
A type of challenge-response test used in computing to determine whether or not the user is human.
Zero Trust
Risk: LowZero Trust Architecture
A security framework requiring all users to be authenticated, authorized, and continuously validated before being granted access to data.
Least Privilege
Risk: LowPrinciple of Least Privilege
The concept that a user or program should only have access to the specific data and resources needed to complete a task.
Defense in Depth
Risk: LowDefense in Depth
An information security strategy that uses multiple layers of security controls throughout an IT system.
Attack Surface
Risk: HighAttack Surface
The sum total of all possible entry points and vulnerabilities in a system that an attacker can exploit.
Penetration Testing
Risk: MediumPenetration Testing
A simulated cyberattack against your computer system to check for exploitable vulnerabilities.
Vulnerability Scan
Risk: LowVulnerability Scanning
An automated process to identify security vulnerabilities in a system or network.
SAST
Risk: LowStatic Application Security Testing
Scanning and analyzing source code for security vulnerabilities without executing the code.
DAST
Risk: MediumDynamic Application Security Testing
Testing an application in its running state to find security vulnerabilities through external inputs.
SCA
Risk: MediumSoftware Composition Analysis
Analyzing third-party open-source libraries used in a project for known security vulnerabilities.
CVE
Risk: MediumCommon Vulnerabilities and Exposures
A list of publicly disclosed cybersecurity vulnerabilities, each assigned a unique identification number.
Zero-Day
Risk: CriticalZero-Day Vulnerability
A vulnerability in software that is unknown to the vendor and has no patch available.
Open Redirect
Risk: MediumOpen Redirect
When an application redirects a user to an external, potentially malicious website specified in a URL parameter.
Command Injection
Risk: CriticalCommand Injection
When an attacker executes arbitrary system commands on the host operating system via a vulnerable application.