Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
183 terms

Security Glossary

Every security term you need to know — clear definitions with real-world context.

C

Cache Poisoning

An attack that manipulates a caching mechanism to serve malicious content to users.

CAPTCHA

A challenge-response test used to determine whether the user is human and prevent automated abuse.

Certificate Pinning

A security technique that associates a host with its expected cryptographic certificate to prevent impersonation.

CIA Triad

The three core principles of information security: confidentiality, integrity, and availability.

Cipher

An algorithm used to encrypt and decrypt data, transforming readable text into an unreadable format and back.

Clickjacking

An attack that tricks users into clicking on hidden elements by overlaying an invisible page on top of a visible one.

Cloud Security

The set of policies, controls, and technologies used to protect data, applications, and infrastructure in cloud environments.

Command Injection

A vulnerability that allows an attacker to execute arbitrary operating system commands on the host server.

Content Security Policy

An HTTP header that controls which resources a browser is allowed to load for a given page, mitigating XSS and data injection.

Cookie

A small piece of data stored in the browser by a website, commonly used for session management and user tracking.

CORS (Cross-Origin Resource Sharing)

A browser mechanism that controls which external domains can access resources on a web server.

Credential Stuffing

An attack that uses stolen username-password pairs from data breaches to gain unauthorized access to other accounts.

Cross-Site Request Forgery (CSRF)

An attack that tricks a user's browser into making unintended requests to a site where the user is authenticated.

Cross-Site Scripting (XSS)

A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

Cryptography

The science of securing information by transforming it into an unreadable format using mathematical algorithms.

CSP

An abbreviation for Content Security Policy, an HTTP header that restricts which resources a browser can load.

CVE (Common Vulnerabilities and Exposures)

A standardized identifier assigned to publicly known cybersecurity vulnerabilities.

CVSS (Common Vulnerability Scoring System)

A standardized framework for rating the severity of security vulnerabilities on a scale from 0.0 to 10.0.

CWE (Common Weakness Enumeration)

A standardized catalog of software and hardware weakness types that can lead to security vulnerabilities.

M

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

Man-in-the-Middle (MitM)

An attack where an adversary secretly intercepts and potentially alters communication between two parties who believe they are communicating directly.

Mass Assignment

A vulnerability where an application automatically binds user-supplied data to internal object properties without filtering, allowing attackers to modify unintended fields.

MIME Sniffing

A browser behavior that determines a resource's content type by inspecting its contents rather than trusting the server-declared Content-Type header.

MitM (Man-in-the-Middle)

An abbreviated term for man-in-the-middle attacks, where an attacker intercepts communication between two parties.

Multi-Factor Authentication

An authentication approach combining two or more independent credentials to verify a user's identity.

Multi-Factor Authentication (MFA)

A security mechanism that requires users to provide two or more independent verification factors to prove their identity.

Multi-Tenancy

A software architecture where a single application instance serves multiple independent customers (tenants) while keeping their data isolated.

Mutation XSS (mXSS)

A cross-site scripting variant that exploits how browsers mutate HTML during parsing and serialization to bypass sanitization.

Security Misconfiguration

A vulnerability category where insecure default settings, incomplete configurations, or unnecessary features leave systems exposed to attack.

P

Parameter Pollution

An attack that manipulates how applications handle duplicate HTTP parameters to bypass security controls or alter application behavior.

Password Hashing

The process of transforming a plaintext password into a fixed-length, irreversible string using a cryptographic function.

Password Reset

A mechanism that allows users to regain access to their account by verifying their identity and setting a new password.

Patch Management

The systematic process of identifying, acquiring, testing, and deploying software updates to fix security vulnerabilities.

Path Traversal

A vulnerability that allows attackers to access files and directories outside the intended scope by manipulating file path inputs.

Payload

The component of an attack that performs the malicious action, such as executing code, extracting data, or altering system behavior.

Penetration Testing

A structured security assessment where testers simulate real-world attacks to identify exploitable vulnerabilities in systems and applications.

Permissions

Controls that define what actions a user, process, or system component is authorized to perform on a given resource.

Phishing

A social engineering attack that tricks individuals into revealing sensitive information by impersonating a trusted entity.

Privilege Escalation

An attack where a user gains higher access rights than they are authorized to have, either vertically or horizontally.

Prototype Pollution

A JavaScript vulnerability where an attacker modifies the prototype of base objects, affecting all instances and potentially leading to code execution.

Proxy

An intermediary server that sits between a client and a destination server, forwarding requests and responses while enabling inspection, filtering, or modification of traffic.

S

Same-Origin Policy

A browser security mechanism that restricts how documents and scripts from one origin can interact with resources from another origin.

SAML (Security Assertion Markup Language)

An XML-based standard for exchanging authentication and authorization data between identity providers and service providers.

Sandbox

An isolated environment that restricts the actions and resources available to a running process, limiting the impact of exploitation.

SAST (Static Application Security Testing)

A testing methodology that analyzes application source code for security vulnerabilities without executing the program.

Secret Management

The practice of securely storing, distributing, and rotating sensitive credentials like API keys, passwords, and encryption keys.

Security Assessment

A structured evaluation of an organization's systems, applications, or infrastructure to identify security weaknesses and risks.

Security Headers

HTTP response headers that instruct browsers to enable specific security features, hardening the application against common attacks.

Sensitive Data

Any information that requires protection due to the risk of harm from its unauthorized disclosure, modification, or loss.

Server-Side Request Forgery

A vulnerability where an attacker can make the server send requests to unintended destinations, potentially accessing internal resources.

Session Fixation

An attack where an adversary sets a user's session identifier to a known value, then hijacks the session after the user authenticates.

Session Hijacking

An attack where an adversary steals or predicts a valid session token to impersonate an authenticated user.

Session Management

The process of securely creating, maintaining, and terminating user sessions that track authenticated state across multiple requests.

Shell Injection

A vulnerability where an attacker injects operating system commands through an application that passes user input to a system shell.

Social Engineering

Manipulation techniques that exploit human psychology to trick people into divulging information or performing actions that compromise security.

SQL Injection

A vulnerability where attacker-controlled input is inserted into SQL queries, allowing unauthorized database access and manipulation.

SSL/TLS

Cryptographic protocols that provide secure, encrypted communication between clients and servers over a network.

SSRF

An abbreviation for Server-Side Request Forgery, a vulnerability where an attacker induces the server to make requests to unintended internal or external destinations.

Stored XSS

A cross-site scripting variant where the malicious script is permanently stored on the target server and executes for every user who views the affected content.

Subdomain Takeover

A vulnerability where an attacker claims control of a subdomain that points to an unclaimed or decommissioned external service.

Supply Chain Attack

An attack that targets an organization indirectly by compromising a trusted third-party component, library, or service that the organization depends on.

Want to go deeper?

Our knowledge base has in-depth articles on major vulnerability classes with real-world examples and prevention guidance.