Web Security Glossary
Comprehensive definitions of web security terms and concepts
Filter by Category
Search Security Terms
Content Security Policy (CSP)
Security HeadersA security standard that helps prevent cross-site scripting (XSS) attacks by allowing website owners to control which resources can be loaded and executed on their pages.
Related terms:
TLS (Transport Layer Security)
Transport SecurityA cryptographic protocol that provides secure communication over a computer network, commonly used to secure HTTPS connections.
Related terms:
CORS (Cross-Origin Resource Sharing)
Cross-Origin SecurityA security feature that allows web pages to make requests to a different domain than the one serving the web page, while maintaining security.
Related terms:
HSTS (HTTP Strict Transport Security)
Security HeadersA web security policy mechanism that helps protect websites against protocol downgrade attacks and cookie hijacking by forcing HTTPS connections.
Related terms:
XSS (Cross-Site Scripting)
Web VulnerabilitiesA type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Related terms:
CSRF (Cross-Site Request Forgery)
Web VulnerabilitiesAn attack that tricks a user into performing unwanted actions on a web application in which they're currently authenticated.
Related terms:
SPF (Sender Policy Framework)
Email SecurityAn email authentication method that helps prevent email spoofing by specifying which mail servers are authorized to send emails for a domain.
Related terms:
DKIM (DomainKeys Identified Mail)
Email SecurityAn email authentication method that uses digital signatures to verify that an email message was sent by an authorized sender.
Related terms:
DMARC (Domain-based Message Authentication, Reporting and Conformance)
Email SecurityAn email authentication protocol that builds on SPF and DKIM to provide domain-level protection against email spoofing.
Related terms:
Clickjacking
Web VulnerabilitiesA malicious technique where an attacker tricks a user into clicking on something different from what the user perceives, potentially revealing confidential information.
Related terms:
Mixed Content
Transport SecurityA security issue where a web page served over HTTPS contains resources (images, scripts, stylesheets) loaded over HTTP, which can compromise security.
Related terms:
Subdomain Takeover
Network SecurityA vulnerability where an attacker can take control of a subdomain by exploiting misconfigured DNS records or abandoned services.
Related terms:
SQL Injection
Web VulnerabilitiesA code injection technique used to attack data-driven applications where malicious SQL statements are inserted into an entry field for execution.
Related terms:
IDOR (Insecure Direct Object Reference)
Web VulnerabilitiesA vulnerability that occurs when an application provides direct access to objects based on user-supplied input, allowing attackers to access unauthorized resources.
Related terms:
SSRF (Server-Side Request Forgery)
Web VulnerabilitiesA vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.
Related terms:
XXE (XML External Entity)
Web VulnerabilitiesA vulnerability that occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser.
Related terms:
Path Traversal
Web VulnerabilitiesA vulnerability that allows an attacker to access files and directories that are stored outside the web root folder by manipulating file paths.
Related terms:
Privilege Escalation
Access ControlA vulnerability that allows an attacker to gain elevated access to resources that are normally protected from an application or user.
Related terms:
Principle of Least Privilege
Access ControlA security principle that states that users and systems should only be granted the minimum level of access necessary to perform their functions.
Related terms:
Man-in-the-Middle (MITM)
Network SecurityAn attack where an attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
Related terms:
DDoS (Distributed Denial of Service)
Network AttacksAn attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users.
Related terms:
Brute Force Attack
Authentication AttacksAn attack that attempts to gain access to a system by trying all possible combinations of passwords or encryption keys.
Related terms:
Credential Stuffing
Authentication AttacksAn attack that uses previously breached username and password combinations to gain unauthorized access to user accounts.
Related terms:
Zero-Day Vulnerability
Vulnerability ManagementA security vulnerability that is unknown to the vendor and for which no patch or fix is available.
Related terms:
CVE (Common Vulnerabilities and Exposures)
Vulnerability ManagementA standardized identifier for publicly known cybersecurity vulnerabilities and exposures.
Related terms:
CVSS (Common Vulnerability Scoring System)
Vulnerability ManagementA standardized framework for rating the severity of security vulnerabilities.
Related terms:
Penetration Testing
Security TestingA security testing methodology that simulates real-world attacks to identify vulnerabilities in systems, networks, or applications.
Related terms:
Vulnerability Assessment
Security TestingA systematic process of identifying, quantifying, and prioritizing security vulnerabilities in systems, networks, or applications.
Related terms:
Threat Modeling
Security DesignA structured approach to identifying and prioritizing potential security threats to a system or application.
Related terms:
Zero Trust
Security ArchitectureA security model that assumes no implicit trust and requires verification for every access request, regardless of location or user.
Related terms:
Defense in Depth
Security DesignA security strategy that employs multiple layers of security controls to protect against various types of attacks.
Related terms:
WAF (Web Application Firewall)
Web SecurityA security device that monitors, filters, and blocks HTTP traffic to and from web applications to protect against common web attacks.
Related terms:
SIEM (Security Information and Event Management)
Security MonitoringA security system that collects, analyzes, and correlates security events from multiple sources to provide real-time threat detection and response.
Related terms:
Incident Response
Security OperationsA structured approach to handling and managing security incidents to minimize damage and restore normal operations.
Related terms:
PCI DSS (Payment Card Industry Data Security Standard)
ComplianceA set of security standards designed to ensure that companies that accept, process, store, or transmit credit card information maintain a secure environment.
Related terms:
HIPAA (Health Insurance Portability and Accountability Act)
ComplianceA US law that establishes national standards for protecting sensitive patient health information.
Related terms:
GDPR (General Data Protection Regulation)
ComplianceA European Union regulation that governs data protection and privacy for individuals within the EU.
Related terms:
SOC 2 (Service Organization Control 2)
ComplianceA framework for evaluating the security, availability, processing integrity, confidentiality, and privacy of service organizations.
Related terms:
ISO 27001
ComplianceAn international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an information security management system.
Related terms:
OWASP (Open Web Application Security Project)
Security ResourcesA nonprofit organization that provides free resources and tools for improving web application security.
Related terms:
OWASP Top 10
Security ResourcesA standard awareness document that represents the most critical security risks to web applications.
Related terms:
APT (Advanced Persistent Threat)
Threat TypesA sophisticated, long-term cyberattack campaign that targets specific organizations or individuals for espionage or sabotage.
Related terms:
Supply Chain Attack
Threat TypesAn attack that targets an organization by compromising one of its suppliers or vendors to gain access to the target organization.
Related terms:
Social Engineering
Attack MethodsThe use of psychological manipulation to trick people into revealing sensitive information or performing actions that compromise security.
Related terms:
Phishing
Attack MethodsA social engineering attack that attempts to trick users into revealing sensitive information by impersonating a trustworthy entity.
Related terms:
Lateral Movement
Attack MethodsThe technique used by attackers to move through a network after gaining initial access, typically to find and access high-value targets.
Related terms:
Exfiltration
Attack MethodsThe process of stealing data from a compromised system and transferring it to an attacker-controlled location.
Related terms:
PII (Personally Identifiable Information)
Data ProtectionInformation that can be used to identify, contact, or locate a specific individual, such as name, address, or social security number.
Related terms:
Data Loss Prevention (DLP)
Data ProtectionA security strategy that prevents sensitive data from being lost, stolen, or accessed by unauthorized users.
Related terms:
Kill Chain
Threat IntelligenceA model that describes the stages of a cyberattack from initial reconnaissance to data exfiltration.
Related terms:
IOC (Indicators of Compromise)
Threat IntelligenceArtifacts that indicate a security incident has occurred, such as IP addresses, file hashes, or domain names.
Related terms:
MITRE ATT&CK
Security ResourcesA globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.
Related terms: