Web Security Glossary

Comprehensive definitions of web security terms and concepts

Filter by Category

Search Security Terms

Content Security Policy (CSP)

Security Headers

A security standard that helps prevent cross-site scripting (XSS) attacks by allowing website owners to control which resources can be loaded and executed on their pages.

Related terms:

XSSSecurity HeadersCSP Directives

TLS (Transport Layer Security)

Transport Security

A cryptographic protocol that provides secure communication over a computer network, commonly used to secure HTTPS connections.

Related terms:

SSLHTTPSCertificateEncryption

CORS (Cross-Origin Resource Sharing)

Cross-Origin Security

A security feature that allows web pages to make requests to a different domain than the one serving the web page, while maintaining security.

Related terms:

Same-Origin PolicyPreflight RequestAccess-Control-Allow-Origin

HSTS (HTTP Strict Transport Security)

Security Headers

A web security policy mechanism that helps protect websites against protocol downgrade attacks and cookie hijacking by forcing HTTPS connections.

Related terms:

HTTPSTLSSecurity Headers

XSS (Cross-Site Scripting)

Web Vulnerabilities

A type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

Related terms:

CSPInput ValidationOutput Encoding

CSRF (Cross-Site Request Forgery)

Web Vulnerabilities

An attack that tricks a user into performing unwanted actions on a web application in which they're currently authenticated.

Related terms:

Anti-CSRF TokenSameSite CookieOrigin Header

SPF (Sender Policy Framework)

Email Security

An email authentication method that helps prevent email spoofing by specifying which mail servers are authorized to send emails for a domain.

Related terms:

DKIMDMARCEmail Authentication

DKIM (DomainKeys Identified Mail)

Email Security

An email authentication method that uses digital signatures to verify that an email message was sent by an authorized sender.

Related terms:

SPFDMARCEmail Authentication

DMARC (Domain-based Message Authentication, Reporting and Conformance)

Email Security

An email authentication protocol that builds on SPF and DKIM to provide domain-level protection against email spoofing.

Related terms:

SPFDKIMEmail Authentication

Clickjacking

Web Vulnerabilities

A malicious technique where an attacker tricks a user into clicking on something different from what the user perceives, potentially revealing confidential information.

Related terms:

X-Frame-OptionsCSP frame-ancestorsFrame Security

Mixed Content

Transport Security

A security issue where a web page served over HTTPS contains resources (images, scripts, stylesheets) loaded over HTTP, which can compromise security.

Related terms:

HTTPSTLSSecurity Headers

Subdomain Takeover

Network Security

A vulnerability where an attacker can take control of a subdomain by exploiting misconfigured DNS records or abandoned services.

Related terms:

DNSCNAMEDomain Security

SQL Injection

Web Vulnerabilities

A code injection technique used to attack data-driven applications where malicious SQL statements are inserted into an entry field for execution.

Related terms:

Input ValidationParameterized QueriesDatabase Security

IDOR (Insecure Direct Object Reference)

Web Vulnerabilities

A vulnerability that occurs when an application provides direct access to objects based on user-supplied input, allowing attackers to access unauthorized resources.

Related terms:

AuthorizationAccess ControlObject References

SSRF (Server-Side Request Forgery)

Web Vulnerabilities

A vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.

Related terms:

Server RequestsNetwork SecurityInput Validation

XXE (XML External Entity)

Web Vulnerabilities

A vulnerability that occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser.

Related terms:

XMLExternal EntitiesFile Inclusion

Path Traversal

Web Vulnerabilities

A vulnerability that allows an attacker to access files and directories that are stored outside the web root folder by manipulating file paths.

Related terms:

Directory TraversalFile AccessInput Validation

Privilege Escalation

Access Control

A vulnerability that allows an attacker to gain elevated access to resources that are normally protected from an application or user.

Related terms:

AuthorizationUser PermissionsSystem Access

Principle of Least Privilege

Access Control

A security principle that states that users and systems should only be granted the minimum level of access necessary to perform their functions.

Related terms:

Access ControlUser PermissionsSecurity Principle

Man-in-the-Middle (MITM)

Network Security

An attack where an attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.

Related terms:

Network InterceptionTLSCertificate Validation

DDoS (Distributed Denial of Service)

Network Attacks

An attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users.

Related terms:

DoSNetwork FloodingAvailability Attack

Brute Force Attack

Authentication Attacks

An attack that attempts to gain access to a system by trying all possible combinations of passwords or encryption keys.

Related terms:

Password AttackDictionary AttackAuthentication Bypass

Credential Stuffing

Authentication Attacks

An attack that uses previously breached username and password combinations to gain unauthorized access to user accounts.

Related terms:

Password ReuseAccount TakeoverData Breach

Zero-Day Vulnerability

Vulnerability Management

A security vulnerability that is unknown to the vendor and for which no patch or fix is available.

Related terms:

Unknown VulnerabilityNo PatchExploit

CVE (Common Vulnerabilities and Exposures)

Vulnerability Management

A standardized identifier for publicly known cybersecurity vulnerabilities and exposures.

Related terms:

Vulnerability DatabaseSecurity AdvisoryCVE ID

CVSS (Common Vulnerability Scoring System)

Vulnerability Management

A standardized framework for rating the severity of security vulnerabilities.

Related terms:

Vulnerability ScoringRisk AssessmentSeverity Rating

Penetration Testing

Security Testing

A security testing methodology that simulates real-world attacks to identify vulnerabilities in systems, networks, or applications.

Related terms:

Security AssessmentVulnerability TestingEthical Hacking

Vulnerability Assessment

Security Testing

A systematic process of identifying, quantifying, and prioritizing security vulnerabilities in systems, networks, or applications.

Related terms:

Vulnerability ScanningRisk AssessmentSecurity Audit

Threat Modeling

Security Design

A structured approach to identifying and prioritizing potential security threats to a system or application.

Related terms:

Risk AssessmentSecurity ArchitectureThreat Analysis

Zero Trust

Security Architecture

A security model that assumes no implicit trust and requires verification for every access request, regardless of location or user.

Related terms:

No Implicit TrustContinuous VerificationSecurity Model

Defense in Depth

Security Design

A security strategy that employs multiple layers of security controls to protect against various types of attacks.

Related terms:

Layered SecurityMultiple ControlsSecurity Strategy

WAF (Web Application Firewall)

Web Security

A security device that monitors, filters, and blocks HTTP traffic to and from web applications to protect against common web attacks.

Related terms:

Web ProtectionHTTP FilteringApplication Security

SIEM (Security Information and Event Management)

Security Monitoring

A security system that collects, analyzes, and correlates security events from multiple sources to provide real-time threat detection and response.

Related terms:

Security AnalyticsEvent CorrelationThreat Detection

Incident Response

Security Operations

A structured approach to handling and managing security incidents to minimize damage and restore normal operations.

Related terms:

Security IncidentCrisis ManagementDamage Control

PCI DSS (Payment Card Industry Data Security Standard)

Compliance

A set of security standards designed to ensure that companies that accept, process, store, or transmit credit card information maintain a secure environment.

Related terms:

Payment SecurityCredit Card DataSecurity Standards

HIPAA (Health Insurance Portability and Accountability Act)

Compliance

A US law that establishes national standards for protecting sensitive patient health information.

Related terms:

Health PrivacyPHI ProtectionMedical Data

GDPR (General Data Protection Regulation)

Compliance

A European Union regulation that governs data protection and privacy for individuals within the EU.

Related terms:

Data PrivacyEU RegulationPersonal Data

SOC 2 (Service Organization Control 2)

Compliance

A framework for evaluating the security, availability, processing integrity, confidentiality, and privacy of service organizations.

Related terms:

Service SecurityAudit FrameworkSecurity Controls

ISO 27001

Compliance

An international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an information security management system.

Related terms:

Security ManagementInternational StandardISMS

OWASP (Open Web Application Security Project)

Security Resources

A nonprofit organization that provides free resources and tools for improving web application security.

Related terms:

Web SecuritySecurity ResourcesOpen Source

OWASP Top 10

Security Resources

A standard awareness document that represents the most critical security risks to web applications.

Related terms:

Web VulnerabilitiesSecurity RisksOWASP

APT (Advanced Persistent Threat)

Threat Types

A sophisticated, long-term cyberattack campaign that targets specific organizations or individuals for espionage or sabotage.

Related terms:

Sophisticated AttackLong-term CampaignTargeted Attack

Supply Chain Attack

Threat Types

An attack that targets an organization by compromising one of its suppliers or vendors to gain access to the target organization.

Related terms:

Vendor CompromiseThird-party RiskSupply Chain Risk

Social Engineering

Attack Methods

The use of psychological manipulation to trick people into revealing sensitive information or performing actions that compromise security.

Related terms:

Psychological ManipulationHuman VulnerabilityDeception

Phishing

Attack Methods

A social engineering attack that attempts to trick users into revealing sensitive information by impersonating a trustworthy entity.

Related terms:

Social EngineeringEmail AttackIdentity Theft

Lateral Movement

Attack Methods

The technique used by attackers to move through a network after gaining initial access, typically to find and access high-value targets.

Related terms:

Network MovementPrivilege EscalationTarget Discovery

Exfiltration

Attack Methods

The process of stealing data from a compromised system and transferring it to an attacker-controlled location.

Related terms:

Data TheftInformation StealingData Transfer

PII (Personally Identifiable Information)

Data Protection

Information that can be used to identify, contact, or locate a specific individual, such as name, address, or social security number.

Related terms:

Personal DataPrivacyData Protection

Data Loss Prevention (DLP)

Data Protection

A security strategy that prevents sensitive data from being lost, stolen, or accessed by unauthorized users.

Related terms:

Data ProtectionSensitive DataAccess Control

Kill Chain

Threat Intelligence

A model that describes the stages of a cyberattack from initial reconnaissance to data exfiltration.

Related terms:

Attack StagesThreat ModelAttack Lifecycle

IOC (Indicators of Compromise)

Threat Intelligence

Artifacts that indicate a security incident has occurred, such as IP addresses, file hashes, or domain names.

Related terms:

Compromise IndicatorsThreat DetectionSecurity Artifacts

MITRE ATT&CK

Security Resources

A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Related terms:

Threat IntelligenceAttack TechniquesAdversary Behavior
Barrion logo icon

Barrion delivers automated security scans and real-time monitoring to keep your applications secure.

Contact us

Have questions or need assistance? Reach out to our team for support.

© 2025-2026 Barrion AB (559569-0917) - All Rights Reserved.