Web Security Glossary

Comprehensive definitions of web security terms and concepts

Filter by Category

Search Security Terms

Content Security Policy (CSP)

Security Headers

A security standard that helps prevent cross-site scripting (XSS) attacks by allowing website owners to control which resources can be loaded and executed on their pages.

Related terms:

XSSSecurity HeadersCSP Directives

TLS (Transport Layer Security)

Transport Security

A cryptographic protocol that provides secure communication over a computer network, commonly used to secure HTTPS connections.

Related terms:

SSLHTTPSCertificateEncryption

CORS (Cross-Origin Resource Sharing)

Cross-Origin Security

A security feature that allows web pages to make requests to a different domain than the one serving the web page, while maintaining security.

Related terms:

Same-Origin PolicyPreflight RequestAccess-Control-Allow-Origin

HSTS (HTTP Strict Transport Security)

Security Headers

A web security policy mechanism that helps protect websites against protocol downgrade attacks and cookie hijacking by forcing HTTPS connections.

Related terms:

HTTPSTLSSecurity Headers

XSS (Cross-Site Scripting)

Web Vulnerabilities

A type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

Related terms:

CSPInput ValidationOutput Encoding

CSRF (Cross-Site Request Forgery)

Web Vulnerabilities

An attack that tricks a user into performing unwanted actions on a web application in which they're currently authenticated.

Related terms:

Anti-CSRF TokenSameSite CookieOrigin Header

SPF (Sender Policy Framework)

Email Security

An email authentication method that helps prevent email spoofing by specifying which mail servers are authorized to send emails for a domain.

Related terms:

DKIMDMARCEmail Authentication

DKIM (DomainKeys Identified Mail)

Email Security

An email authentication method that uses digital signatures to verify that an email message was sent by an authorized sender.

Related terms:

SPFDMARCEmail Authentication

DMARC (Domain-based Message Authentication, Reporting and Conformance)

Email Security

An email authentication protocol that builds on SPF and DKIM to provide domain-level protection against email spoofing.

Related terms:

SPFDKIMEmail Authentication

Clickjacking

Web Vulnerabilities

A malicious technique where an attacker tricks a user into clicking on something different from what the user perceives, potentially revealing confidential information.

Related terms:

X-Frame-OptionsCSP frame-ancestorsFrame Security

Mixed Content

Transport Security

A security issue where a web page served over HTTPS contains resources (images, scripts, stylesheets) loaded over HTTP, which can compromise security.

Related terms:

HTTPSTLSSecurity Headers

Subdomain Takeover

Network Security

A vulnerability where an attacker can take control of a subdomain by exploiting misconfigured DNS records or abandoned services.

Related terms:

DNSCNAMEDomain Security

SQL Injection

Web Vulnerabilities

A code injection technique used to attack data-driven applications where malicious SQL statements are inserted into an entry field for execution.

Related terms:

Input ValidationParameterized QueriesDatabase Security

NoSQL Injection

Web Vulnerabilities

A vulnerability that occurs when user input is not properly sanitized before being used in NoSQL database queries, allowing attackers to manipulate database operations.

Related terms:

MongoDBInput ValidationDatabase Security

LDAP Injection

Web Vulnerabilities

A vulnerability that occurs when user input is not properly sanitized before being used in LDAP queries, potentially allowing unauthorized access to directory services.

Related terms:

LDAPInput ValidationDirectory Services

Command Injection

Web Vulnerabilities

A vulnerability that occurs when user input is not properly sanitized before being passed to a system shell, allowing attackers to execute arbitrary commands.

Related terms:

System CommandsInput ValidationShell Security

IDOR (Insecure Direct Object Reference)

Web Vulnerabilities

A vulnerability that occurs when an application provides direct access to objects based on user-supplied input, allowing attackers to access unauthorized resources.

Related terms:

AuthorizationAccess ControlObject References

SSRF (Server-Side Request Forgery)

Web Vulnerabilities

A vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.

Related terms:

Server RequestsNetwork SecurityInput Validation

XXE (XML External Entity)

Web Vulnerabilities

A vulnerability that occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser.

Related terms:

XMLExternal EntitiesFile Inclusion

LFI (Local File Inclusion)

Web Vulnerabilities

A vulnerability that allows an attacker to include files on a server through the web browser, potentially leading to code execution or information disclosure.

Related terms:

File InclusionPath TraversalServer Security

RFI (Remote File Inclusion)

Web Vulnerabilities

A vulnerability that allows an attacker to include remote files on a server through the web browser, potentially leading to code execution.

Related terms:

File InclusionRemote FilesCode Execution

Path Traversal

Web Vulnerabilities

A vulnerability that allows an attacker to access files and directories that are stored outside the web root folder by manipulating file paths.

Related terms:

Directory TraversalFile AccessInput Validation

Buffer Overflow

System Vulnerabilities

A vulnerability that occurs when a program writes more data to a buffer than it can hold, potentially leading to code execution or system crashes.

Related terms:

Memory ManagementCode ExecutionStack Overflow

Integer Overflow

System Vulnerabilities

A vulnerability that occurs when an arithmetic operation results in a value that is too large to be represented in the allocated storage space.

Related terms:

Arithmetic OperationsMemory ManagementBuffer Overflow

Race Condition

System Vulnerabilities

A vulnerability that occurs when the behavior of a system depends on the sequence or timing of uncontrollable events, potentially leading to security issues.

Related terms:

ConcurrencyTiming AttacksThread Safety

Time-of-Check Time-of-Use (TOCTOU)

System Vulnerabilities

A race condition vulnerability that occurs when a system checks a condition and then uses the result, but the condition may change between the check and use.

Related terms:

Race ConditionFile OperationsSecurity Checks

Privilege Escalation

Access Control

A vulnerability that allows an attacker to gain elevated access to resources that are normally protected from an application or user.

Related terms:

AuthorizationUser PermissionsSystem Access

Vertical Privilege Escalation

Access Control

A type of privilege escalation where an attacker gains access to resources or functions that are normally restricted to higher-privileged users.

Related terms:

Privilege EscalationUser RolesAuthorization

Horizontal Privilege Escalation

Access Control

A type of privilege escalation where an attacker gains access to resources that belong to another user with the same privilege level.

Related terms:

Privilege EscalationUser DataAuthorization

Session Fixation

Session Security

A vulnerability that allows an attacker to hijack a user's session by forcing the user to use a session ID that the attacker knows.

Related terms:

Session ManagementSession HijackingAuthentication

Session Hijacking

Session Security

A vulnerability that allows an attacker to take over a user's session by stealing or predicting the session ID.

Related terms:

Session ManagementSession FixationAuthentication

Man-in-the-Middle (MITM)

Network Security

An attack where an attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.

Related terms:

Network InterceptionTLSCertificate Validation

DNS Spoofing

Network Security

An attack that corrupts the domain name system (DNS) to redirect traffic to malicious websites or servers.

Related terms:

DNSDomain ResolutionNetwork Security

ARP Spoofing

Network Security

An attack that sends falsified ARP (Address Resolution Protocol) messages to a local area network, allowing the attacker to intercept data.

Related terms:

ARPNetwork InterceptionLocal Network

Phishing

Social Engineering

A social engineering attack that attempts to trick users into revealing sensitive information by impersonating a trustworthy entity.

Related terms:

Social EngineeringEmail SecurityUser Education

Spear Phishing

Social Engineering

A targeted phishing attack that is directed at specific individuals or organizations, often using personalized information.

Related terms:

PhishingTargeted AttacksSocial Engineering

Whaling

Social Engineering

A type of spear phishing attack that targets high-profile individuals such as executives or celebrities.

Related terms:

Spear PhishingExecutive TargetingSocial Engineering

Vishing

Social Engineering

A social engineering attack that uses voice communication to trick victims into revealing sensitive information.

Related terms:

Voice PhishingSocial EngineeringPhone Scams

Smishing

Social Engineering

A social engineering attack that uses SMS (text messages) to trick victims into revealing sensitive information or clicking malicious links.

Related terms:

SMS PhishingSocial EngineeringMobile Security

Pretexting

Social Engineering

A social engineering attack where an attacker creates a false scenario to trick victims into revealing sensitive information.

Related terms:

Social EngineeringFalse ScenariosInformation Gathering

Baiting

Social Engineering

A social engineering attack that uses the promise of something enticing to trick victims into revealing sensitive information or installing malware.

Related terms:

Social EngineeringMalware DistributionUser Manipulation

Tailgating

Physical Security

A physical social engineering attack where an attacker follows an authorized person into a restricted area.

Related terms:

Physical AccessSocial EngineeringAccess Control

Shoulder Surfing

Physical Security

A physical social engineering attack where an attacker observes a victim entering sensitive information such as passwords or PINs.

Related terms:

Physical AccessInformation TheftUser Awareness

Dumpster Diving

Physical Security

A physical social engineering attack where an attacker searches through trash or recycling bins for sensitive information.

Related terms:

Physical AccessInformation DisposalData Protection

Malware

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems or networks.

Related terms:

VirusTrojanRansomwareSpyware

Virus

Malware

A type of malware that replicates itself by modifying other computer programs and inserting its own code.

Related terms:

MalwareReplicationSystem Infection

Worm

Malware

A type of malware that replicates itself to spread to other computers, often without user intervention.

Related terms:

MalwareSelf-ReplicationNetwork Spread

Trojan Horse

Malware

A type of malware that disguises itself as legitimate software to trick users into installing it.

Related terms:

MalwareDisguiseUser Deception

Ransomware

Malware

A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.

Related terms:

MalwareFile EncryptionExtortion

Spyware

Malware

A type of malware that secretly monitors and collects information about a user's activities without their knowledge.

Related terms:

MalwareSurveillancePrivacy Invasion

Adware

Malware

A type of malware that displays unwanted advertisements to users, often bundled with legitimate software.

Related terms:

MalwareAdvertisingUnwanted Software

Rootkit

Malware

A type of malware that provides privileged access to a computer while hiding its presence from the user and security software.

Related terms:

MalwarePrivilege EscalationSystem Hiding

Backdoor

Malware

A type of malware that provides unauthorized access to a computer system, often bypassing normal authentication procedures.

Related terms:

MalwareUnauthorized AccessAuthentication Bypass

Botnet

Malware

A network of compromised computers that are controlled by an attacker to perform malicious activities such as DDoS attacks or spam distribution.

Related terms:

MalwareNetwork ControlDDoSSpam

Keylogger

Malware

A type of malware that records keystrokes made by a user, often to steal passwords or other sensitive information.

Related terms:

MalwareKeystroke RecordingPassword Theft

Screen Scraper

Malware

A type of malware that captures screenshots of a user's screen, often to steal sensitive information displayed on the screen.

Related terms:

MalwareScreen CaptureInformation Theft

Cryptocurrency Miner

Malware

A type of malware that uses a victim's computer resources to mine cryptocurrency without their knowledge or consent.

Related terms:

MalwareCryptocurrencyResource Theft

DDoS (Distributed Denial of Service)

Network Attacks

An attack that overwhelms a target system with traffic from multiple sources, making it unavailable to legitimate users.

Related terms:

DoSNetwork FloodingAvailability Attack

DoS (Denial of Service)

Network Attacks

An attack that overwhelms a target system with traffic or requests, making it unavailable to legitimate users.

Related terms:

DDoSNetwork FloodingAvailability Attack

SYN Flood

Network Attacks

A type of DoS attack that exploits the TCP handshake process by sending a flood of SYN packets without completing the connection.

Related terms:

DoSTCPNetwork Flooding

Ping Flood

Network Attacks

A type of DoS attack that overwhelms a target system with ICMP echo request packets (ping packets).

Related terms:

DoSICMPNetwork Flooding

HTTP Flood

Network Attacks

A type of DoS attack that overwhelms a web server with HTTP requests, often using multiple sources.

Related terms:

DoSHTTPWeb Server Attack

Slowloris

Network Attacks

A type of DoS attack that keeps many connections to the target web server open and holds them open as long as possible.

Related terms:

DoSHTTPConnection Exhaustion

Brute Force Attack

Authentication Attacks

An attack that attempts to gain access to a system by trying all possible combinations of passwords or encryption keys.

Related terms:

Password AttackDictionary AttackAuthentication Bypass

Dictionary Attack

Authentication Attacks

A type of brute force attack that uses a predefined list of words (dictionary) to attempt to guess passwords.

Related terms:

Brute ForcePassword AttackWord List

Rainbow Table Attack

Authentication Attacks

An attack that uses precomputed hash tables to crack password hashes more quickly than traditional brute force methods.

Related terms:

Password AttackHash CrackingPrecomputed Tables

Credential Stuffing

Authentication Attacks

An attack that uses previously breached username and password combinations to gain unauthorized access to user accounts.

Related terms:

Password ReuseAccount TakeoverData Breach

Password Spraying

Authentication Attacks

An attack that attempts to gain access to multiple accounts by trying a small number of common passwords against many usernames.

Related terms:

Brute ForceCommon PasswordsAccount Takeover

Side-Channel Attack

Cryptographic Attacks

An attack that exploits information gained from the physical implementation of a computer system rather than weaknesses in the algorithm itself.

Related terms:

CryptanalysisPhysical SecurityInformation Leakage

Timing Attack

Cryptographic Attacks

A type of side-channel attack that exploits the time taken to execute cryptographic operations to gain information about the secret key.

Related terms:

Side-Channel AttackTiming AnalysisCryptographic Security

Power Analysis Attack

Cryptographic Attacks

A type of side-channel attack that analyzes the power consumption of a cryptographic device to extract secret information.

Related terms:

Side-Channel AttackPower ConsumptionHardware Security

Fault Injection Attack

Cryptographic Attacks

A type of side-channel attack that introduces faults into a system to cause it to behave in unexpected ways, potentially revealing secret information.

Related terms:

Side-Channel AttackSystem FaultsHardware Security

Man-in-the-Browser (MITB)

Browser Security

An attack where malware running in a user's browser intercepts and modifies web transactions without the user's knowledge.

Related terms:

Browser MalwareTransaction InterceptionWeb Security

Man-in-the-Middle (MITM)

Network Security

An attack where an attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.

Related terms:

Network InterceptionTLSCertificate Validation

Zero-Day Vulnerability

Vulnerability Management

A security vulnerability that is unknown to the vendor and for which no patch or fix is available.

Related terms:

Unknown VulnerabilityNo PatchExploit

Zero-Day Exploit

Vulnerability Management

An exploit that takes advantage of a zero-day vulnerability to attack a system before a patch is available.

Related terms:

Zero-Day VulnerabilityExploitNo Patch

CVE (Common Vulnerabilities and Exposures)

Vulnerability Management

A standardized identifier for publicly known cybersecurity vulnerabilities and exposures.

Related terms:

Vulnerability DatabaseSecurity AdvisoryCVE ID

CVSS (Common Vulnerability Scoring System)

Vulnerability Management

A standardized framework for rating the severity of security vulnerabilities.

Related terms:

Vulnerability ScoringRisk AssessmentSeverity Rating

Penetration Testing

Security Testing

A security testing methodology that simulates real-world attacks to identify vulnerabilities in systems, networks, or applications.

Related terms:

Security AssessmentVulnerability TestingEthical Hacking

Vulnerability Assessment

Security Testing

A systematic process of identifying, quantifying, and prioritizing security vulnerabilities in systems, networks, or applications.

Related terms:

Vulnerability ScanningRisk AssessmentSecurity Audit

Security Audit

Security Testing

A systematic evaluation of an organization's security policies, procedures, and controls to ensure they are effective and compliant.

Related terms:

ComplianceSecurity ReviewPolicy Assessment

Red Team

Security Testing

A group of security professionals who simulate real-world attacks to test an organization's security defenses and response capabilities.

Related terms:

Penetration TestingAttack SimulationSecurity Assessment

Blue Team

Security Testing

A group of security professionals responsible for defending an organization's systems and networks against cyberattacks.

Related terms:

DefenseIncident ResponseSecurity Operations

Purple Team

Security Testing

A collaborative approach that combines red team and blue team activities to improve overall security posture.

Related terms:

Red TeamBlue TeamCollaborative Security

Threat Modeling

Security Design

A structured approach to identifying and prioritizing potential security threats to a system or application.

Related terms:

Risk AssessmentSecurity ArchitectureThreat Analysis

Attack Surface

Security Design

The sum of all possible points where an attacker could attempt to enter or extract data from a system or network.

Related terms:

Vulnerability PointsEntry PointsSecurity Perimeter

Defense in Depth

Security Design

A security strategy that employs multiple layers of security controls to protect against various types of attacks.

Related terms:

Layered SecurityMultiple ControlsSecurity Strategy

Principle of Least Privilege

Access Control

A security principle that states that users and systems should only be granted the minimum level of access necessary to perform their functions.

Related terms:

Access ControlUser PermissionsSecurity Principle

Separation of Duties

Access Control

A security principle that divides critical functions among multiple people to prevent fraud and errors.

Related terms:

Access ControlFraud PreventionSecurity Principle

Fail Secure

Security Design

A security principle that states that when a system fails, it should fail in a secure state rather than an insecure one.

Related terms:

Security PrincipleSystem FailureSecure Defaults

Fail Safe

Security Design

A security principle that states that when a system fails, it should fail in a way that minimizes harm and maintains security.

Related terms:

Security PrincipleSystem FailureHarm Minimization

Security by Design

Security Design

An approach to software and system development that integrates security considerations throughout the entire development lifecycle.

Related terms:

Secure DevelopmentSecurity IntegrationDevelopment Lifecycle

Secure by Default

Security Design

A security principle that states that systems should be configured with secure settings by default, requiring explicit action to make them less secure.

Related terms:

Default SecuritySecure ConfigurationSecurity Principle

Zero Trust

Security Architecture

A security model that assumes no implicit trust and requires verification for every access request, regardless of location or user.

Related terms:

No Implicit TrustContinuous VerificationSecurity Model

Microsegmentation

Network Security

A security technique that divides a network into smaller, isolated segments to limit the spread of attacks and improve security.

Related terms:

Network SegmentationIsolationAttack Containment

Network Segmentation

Network Security

A security technique that divides a network into smaller, isolated segments to control traffic flow and improve security.

Related terms:

MicrosegmentationTraffic ControlNetwork Isolation

VLAN (Virtual Local Area Network)

Network Security

A logical network segment that allows devices to communicate as if they were on the same physical network, regardless of their physical location.

Related terms:

Network SegmentationLogical NetworksTraffic Isolation

Firewall

Network Security

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Related terms:

Traffic ControlNetwork SecurityAccess Control

WAF (Web Application Firewall)

Web Security

A security device that monitors, filters, and blocks HTTP traffic to and from web applications to protect against common web attacks.

Related terms:

Web ProtectionHTTP FilteringApplication Security

IDS (Intrusion Detection System)

Network Security

A security device that monitors network or system activities for malicious activities or policy violations.

Related terms:

Threat DetectionSecurity MonitoringAnomaly Detection

IPS (Intrusion Prevention System)

Network Security

A security device that monitors network or system activities and can automatically block or prevent malicious activities.

Related terms:

Threat PreventionAutomatic BlockingSecurity Control

SIEM (Security Information and Event Management)

Security Monitoring

A security system that collects, analyzes, and correlates security events from multiple sources to provide real-time threat detection and response.

Related terms:

Security AnalyticsEvent CorrelationThreat Detection

SOAR (Security Orchestration, Automation and Response)

Security Operations

A security system that automates and orchestrates security operations to improve incident response and reduce manual tasks.

Related terms:

Security AutomationIncident ResponseSecurity Orchestration

EDR (Endpoint Detection and Response)

Endpoint Security

A security solution that continuously monitors and responds to threats on endpoints such as desktops, laptops, and servers.

Related terms:

Endpoint MonitoringThreat ResponseDevice Security

XDR (Extended Detection and Response)

Security Monitoring

A security solution that provides comprehensive threat detection and response across multiple security layers and data sources.

Related terms:

Comprehensive SecurityMulti-Layer DetectionThreat Response

MDR (Managed Detection and Response)

Security Services

A security service that provides 24/7 monitoring, threat detection, and response capabilities managed by a third-party provider.

Related terms:

Managed Security24/7 MonitoringThird-Party Security

SOC (Security Operations Center)

Security Operations

A centralized facility where security professionals monitor, detect, and respond to cybersecurity threats and incidents.

Related terms:

Security MonitoringIncident ResponseSecurity Team

NOC (Network Operations Center)

Network Operations

A centralized facility where network professionals monitor and manage network infrastructure and performance.

Related terms:

Network MonitoringInfrastructure ManagementNetwork Team

Incident Response

Security Operations

A structured approach to handling and managing security incidents to minimize damage and restore normal operations.

Related terms:

Security IncidentCrisis ManagementDamage Control

Digital Forensics

Security Operations

The process of collecting, analyzing, and preserving digital evidence from computer systems and networks for legal or investigative purposes.

Related terms:

Evidence CollectionInvestigationLegal Proceedings

Chain of Custody

Security Operations

A legal concept that tracks the handling of evidence from collection to presentation in court to ensure its integrity and admissibility.

Related terms:

Evidence IntegrityLegal AdmissibilityForensic Process

Business Continuity

Risk Management

The ability of an organization to continue operating during and after a disaster or security incident.

Related terms:

Disaster RecoveryOperational ContinuityCrisis Management

Disaster Recovery

Risk Management

The process of restoring IT systems and data after a disaster or security incident to resume normal operations.

Related terms:

Business ContinuitySystem RestorationData Recovery

RTO (Recovery Time Objective)

Risk Management

The maximum acceptable time for restoring a system or service after a disaster or security incident.

Related terms:

Recovery TimeService RestorationBusiness Continuity

RPO (Recovery Point Objective)

Risk Management

The maximum acceptable amount of data loss measured in time, representing the point to which data must be restored.

Related terms:

Data LossBackup FrequencyData Recovery

Backup

Data Protection

A copy of data or systems that can be used to restore information in case of data loss or system failure.

Related terms:

Data RecoverySystem RestorationData Preservation

Archive

Data Protection

Long-term storage of data that is no longer actively used but may be needed for compliance or historical purposes.

Related terms:

Long-term StorageData RetentionCompliance

Data Retention

Data Protection

The practice of keeping data for a specific period of time based on legal, regulatory, or business requirements.

Related terms:

Data LifecycleComplianceData Management

Data Classification

Data Protection

The process of categorizing data based on its sensitivity, value, and regulatory requirements to determine appropriate protection measures.

Related terms:

Data SensitivityProtection LevelsData Governance

Data Loss Prevention (DLP)

Data Protection

A security strategy that prevents sensitive data from being lost, stolen, or accessed by unauthorized users.

Related terms:

Data ProtectionSensitive DataAccess Control

Data Masking

Data Protection

A technique that replaces sensitive data with fictitious but realistic data to protect privacy while maintaining data usability.

Related terms:

Data PrivacySensitive DataData Anonymization

Data Anonymization

Data Protection

The process of removing or modifying personally identifiable information from data to protect privacy.

Related terms:

Data PrivacyPII RemovalData Protection

Data Pseudonymization

Data Protection

The process of replacing personally identifiable information with pseudonyms to protect privacy while maintaining data utility.

Related terms:

Data PrivacyPII ReplacementData Protection

PII (Personally Identifiable Information)

Data Protection

Information that can be used to identify, contact, or locate a specific individual, such as name, address, or social security number.

Related terms:

Personal DataPrivacyData Protection

PHI (Protected Health Information)

Data Protection

Individually identifiable health information that is protected under HIPAA regulations.

Related terms:

Health DataHIPAAMedical Privacy

PCI DSS (Payment Card Industry Data Security Standard)

Compliance

A set of security standards designed to ensure that companies that accept, process, store, or transmit credit card information maintain a secure environment.

Related terms:

Payment SecurityCredit Card DataSecurity Standards

HIPAA (Health Insurance Portability and Accountability Act)

Compliance

A US law that establishes national standards for protecting sensitive patient health information.

Related terms:

Health PrivacyPHI ProtectionMedical Data

GDPR (General Data Protection Regulation)

Compliance

A European Union regulation that governs data protection and privacy for individuals within the EU.

Related terms:

Data PrivacyEU RegulationPersonal Data

SOC 2 (Service Organization Control 2)

Compliance

A framework for evaluating the security, availability, processing integrity, confidentiality, and privacy of service organizations.

Related terms:

Service SecurityAudit FrameworkSecurity Controls

ISO 27001

Compliance

An international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an information security management system.

Related terms:

Security ManagementInternational StandardISMS

NIST Cybersecurity Framework

Compliance

A voluntary framework that provides guidance on managing cybersecurity risk based on existing standards, guidelines, and practices.

Related terms:

Cybersecurity RiskSecurity FrameworkRisk Management

OWASP (Open Web Application Security Project)

Security Resources

A nonprofit organization that provides free resources and tools for improving web application security.

Related terms:

Web SecuritySecurity ResourcesOpen Source

OWASP Top 10

Security Resources

A standard awareness document that represents the most critical security risks to web applications.

Related terms:

Web VulnerabilitiesSecurity RisksOWASP

OWASP ASVS (Application Security Verification Standard)

Security Resources

A framework for performing comprehensive security testing of web applications and APIs.

Related terms:

Security TestingApplication SecurityOWASP

OWASP SAMM (Software Assurance Maturity Model)

Security Resources

A framework for implementing and measuring secure software development practices.

Related terms:

Secure DevelopmentSoftware SecurityOWASP

SANS Top 25

Security Resources

A list of the most dangerous programming errors that can lead to serious vulnerabilities in software.

Related terms:

Programming ErrorsSoftware VulnerabilitiesSANS

CWE (Common Weakness Enumeration)

Security Resources

A community-developed list of common software security weaknesses that can be used as a baseline for weakness identification and mitigation.

Related terms:

Software WeaknessesVulnerability ClassificationSecurity Standards

CAPEC (Common Attack Pattern Enumeration and Classification)

Security Resources

A comprehensive dictionary of known attack patterns used by adversaries to exploit weaknesses in applications and systems.

Related terms:

Attack PatternsThreat IntelligenceSecurity Knowledge

MITRE ATT&CK

Security Resources

A globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Related terms:

Threat IntelligenceAttack TechniquesAdversary Behavior

Kill Chain

Threat Intelligence

A model that describes the stages of a cyberattack from initial reconnaissance to data exfiltration.

Related terms:

Attack StagesThreat ModelAttack Lifecycle

Diamond Model

Threat Intelligence

A framework for analyzing cybersecurity incidents by examining the relationships between adversaries, capabilities, infrastructure, and victims.

Related terms:

Incident AnalysisThreat ModelAttack Attribution

Threat Intelligence

Threat Intelligence

Evidence-based knowledge about existing or emerging threats that can be used to inform security decisions and actions.

Related terms:

Threat InformationSecurity IntelligenceRisk Assessment

IOC (Indicators of Compromise)

Threat Intelligence

Artifacts that indicate a security incident has occurred, such as IP addresses, file hashes, or domain names.

Related terms:

Compromise IndicatorsThreat DetectionSecurity Artifacts

TTPs (Tactics, Techniques, and Procedures)

Threat Intelligence

The methods and patterns used by threat actors to achieve their objectives, including the tools and techniques they employ.

Related terms:

Attack MethodsThreat BehaviorAdversary Patterns

APT (Advanced Persistent Threat)

Threat Types

A sophisticated, long-term cyberattack campaign that targets specific organizations or individuals for espionage or sabotage.

Related terms:

Sophisticated AttackLong-term CampaignTargeted Attack

Insider Threat

Threat Types

A security risk that originates from within an organization, typically from employees, contractors, or business partners.

Related terms:

Internal ThreatEmployee RiskTrusted Insider

Supply Chain Attack

Threat Types

An attack that targets an organization by compromising one of its suppliers or vendors to gain access to the target organization.

Related terms:

Vendor CompromiseThird-party RiskSupply Chain Risk

Watering Hole Attack

Threat Types

An attack that targets a specific group by compromising websites that members of the group are known to visit.

Related terms:

Targeted AttackWebsite CompromiseGroup Targeting

Drive-by Download

Threat Types

An attack that automatically downloads malware to a user's computer when they visit a compromised website.

Related terms:

Malware DownloadWebsite CompromiseAutomatic Infection

Social Engineering

Attack Methods

The use of psychological manipulation to trick people into revealing sensitive information or performing actions that compromise security.

Related terms:

Psychological ManipulationHuman VulnerabilityDeception

Phishing

Attack Methods

A social engineering attack that attempts to trick users into revealing sensitive information by impersonating a trustworthy entity.

Related terms:

Social EngineeringEmail AttackIdentity Theft

Vishing

Attack Methods

A social engineering attack that uses voice communication to trick victims into revealing sensitive information.

Related terms:

Voice PhishingPhone ScamSocial Engineering

Smishing

Attack Methods

A social engineering attack that uses SMS (text messages) to trick victims into revealing sensitive information or clicking malicious links.

Related terms:

SMS PhishingText Message AttackSocial Engineering

Pretexting

Attack Methods

A social engineering attack where an attacker creates a false scenario to trick victims into revealing sensitive information.

Related terms:

False ScenarioDeceptionSocial Engineering

Baiting

Attack Methods

A social engineering attack that uses the promise of something enticing to trick victims into revealing sensitive information or installing malware.

Related terms:

EnticementMalware DistributionSocial Engineering

Tailgating

Attack Methods

A physical social engineering attack where an attacker follows an authorized person into a restricted area.

Related terms:

Physical AccessUnauthorized EntrySocial Engineering

Shoulder Surfing

Attack Methods

A physical social engineering attack where an attacker observes a victim entering sensitive information such as passwords or PINs.

Related terms:

Visual ObservationInformation TheftPhysical Security

Dumpster Diving

Attack Methods

A physical social engineering attack where an attacker searches through trash or recycling bins for sensitive information.

Related terms:

Information GatheringPhysical AccessData Disposal

Eavesdropping

Attack Methods

The act of secretly listening to or monitoring communications between parties without their knowledge or consent.

Related terms:

Communication InterceptionPrivacy ViolationSurveillance

Wiretapping

Attack Methods

The act of secretly monitoring telephone or internet communications, often for law enforcement or intelligence purposes.

Related terms:

Communication MonitoringSurveillancePrivacy Violation

Packet Sniffing

Attack Methods

The practice of intercepting and logging network traffic to analyze data packets for security or troubleshooting purposes.

Related terms:

Network MonitoringTraffic AnalysisData Interception

Network Tapping

Attack Methods

The practice of intercepting network communications by physically or logically accessing network infrastructure.

Related terms:

Network InterceptionInfrastructure AccessTraffic Monitoring

Port Scanning

Attack Methods

The practice of scanning a network to identify open ports and services running on target systems.

Related terms:

Network ReconnaissanceService DiscoveryVulnerability Assessment

Vulnerability Scanning

Attack Methods

The practice of scanning systems and networks to identify known security vulnerabilities and misconfigurations.

Related terms:

Security AssessmentVulnerability DiscoverySystem Scanning

Exploit

Attack Methods

A piece of software, data, or sequence of commands that takes advantage of a vulnerability to cause unintended behavior in a system.

Related terms:

Vulnerability ExploitationAttack CodeSystem Compromise

Payload

Attack Methods

The part of an exploit that performs the actual malicious action, such as installing malware or stealing data.

Related terms:

Malicious CodeExploit ComponentAttack Action

Shellcode

Attack Methods

A small piece of code used as the payload in an exploit to provide a command shell or other functionality to an attacker.

Related terms:

Exploit PayloadCommand ShellSystem Access

Rootkit

Attack Methods

A collection of malicious software designed to provide privileged access to a computer while hiding its presence from the user and security software.

Related terms:

System HidingPrivilege EscalationStealth Malware

Backdoor

Attack Methods

A method of bypassing normal authentication or security controls to gain unauthorized access to a system.

Related terms:

Unauthorized AccessAuthentication BypassSystem Compromise

Trojan Horse

Attack Methods

A type of malware that disguises itself as legitimate software to trick users into installing it.

Related terms:

Malware DisguiseUser DeceptionSoftware Masquerading

Ransomware

Attack Methods

A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.

Related terms:

File EncryptionExtortionData Hostage

Cryptocurrency Miner

Attack Methods

A type of malware that uses a victim's computer resources to mine cryptocurrency without their knowledge or consent.

Related terms:

Resource TheftCryptocurrencyUnauthorized Mining

Botnet

Attack Methods

A network of compromised computers that are controlled by an attacker to perform malicious activities such as DDoS attacks or spam distribution.

Related terms:

Compromised NetworkDistributed AttackMalware Network

Command and Control (C&C)

Attack Methods

The infrastructure used by attackers to communicate with and control compromised systems in a botnet.

Related terms:

Botnet ControlMalware CommunicationAttack Infrastructure

Lateral Movement

Attack Methods

The technique used by attackers to move through a network after gaining initial access, typically to find and access high-value targets.

Related terms:

Network MovementPrivilege EscalationTarget Discovery

Persistence

Attack Methods

The technique used by attackers to maintain access to a compromised system even after reboots or security updates.

Related terms:

Access MaintenanceSystem CompromiseLong-term Access

Exfiltration

Attack Methods

The process of stealing data from a compromised system and transferring it to an attacker-controlled location.

Related terms:

Data TheftInformation StealingData Transfer

Covering Tracks

Attack Methods

The technique used by attackers to hide evidence of their activities and maintain access to compromised systems.

Related terms:

Evidence HidingStealth OperationsForensic Evasion

Anti-Forensics

Attack Methods

Techniques used by attackers to make forensic analysis more difficult or impossible, such as deleting logs or encrypting data.

Related terms:

Forensic EvasionEvidence DestructionInvestigation Hindrance

Obfuscation

Attack Methods

The technique of making code or data difficult to understand or analyze, often used by malware to evade detection.

Related terms:

Code HidingDetection EvasionMalware Stealth

Packing

Attack Methods

The technique of compressing or encrypting executable files to make them smaller and harder to analyze.

Related terms:

File CompressionCode HidingMalware Stealth

Polymorphism

Attack Methods

The technique of changing the appearance of malware while maintaining its functionality to evade signature-based detection.

Related terms:

Code MutationDetection EvasionMalware Evolution

Metamorphism

Attack Methods

The technique of completely rewriting malware code while maintaining its functionality to evade detection.

Related terms:

Code RewritingDetection EvasionMalware Transformation

Sandbox Evasion

Attack Methods

Techniques used by malware to detect and avoid analysis in sandbox environments.

Related terms:

Analysis EvasionSandbox DetectionMalware Stealth

VM Detection

Attack Methods

Techniques used by malware to detect if it's running in a virtual machine environment and modify its behavior accordingly.

Related terms:

Virtual Machine DetectionEnvironment AnalysisMalware Adaptation

Debugger Detection

Attack Methods

Techniques used by malware to detect if it's being analyzed by a debugger and modify its behavior accordingly.

Related terms:

Analysis DetectionDebugger EvasionMalware Stealth

Process Hollowing

Attack Methods

A technique used by malware to replace the code of a legitimate process with malicious code while maintaining the process's appearance.

Related terms:

Process ReplacementCode InjectionLegitimate Process Abuse

DLL Injection

Attack Methods

A technique used by malware to inject malicious code into a running process by loading a malicious DLL.

Related terms:

Code InjectionProcess ManipulationDLL Hijacking

Process Injection

Attack Methods

A technique used by malware to inject malicious code into a running process to execute it in the context of that process.

Related terms:

Code InjectionProcess ManipulationExecution Context

Thread Injection

Attack Methods

A technique used by malware to inject malicious code into a running thread to execute it in the context of that thread.

Related terms:

Code InjectionThread ManipulationExecution Context

Reflective DLL Loading

Attack Methods

A technique used by malware to load a DLL into memory without using the standard Windows API, making it harder to detect.

Related terms:

DLL LoadingMemory LoadingAPI Evasion

Process Doppelgänging

Attack Methods

A technique used by malware to create a process with malicious code while making it appear as a legitimate process.

Related terms:

Process CreationLegitimate AppearanceMalware Stealth

Atom Bombing

Attack Methods

A technique used by malware to inject malicious code into a process using Windows atom tables.

Related terms:

Code InjectionAtom TablesProcess Manipulation

Process Herpaderping

Attack Methods

A technique used by malware to create a process with malicious code while making it appear as a legitimate process.

Related terms:

Process CreationLegitimate AppearanceMalware Stealth

Process Ghosting

Attack Methods

A technique used by malware to create a process with malicious code while making it appear as a legitimate process.

Related terms:

Process CreationLegitimate AppearanceMalware Stealth
Barrion logo iconBarrion

Barrion delivers automated security scans and real-time monitoring to keep your applications secure.

Contact Us

Have questions or need assistance? Reach out to our team for support.

© 2025 Barrion - All Rights Reserved.