Web Security Glossary
Comprehensive definitions of web security terms and concepts
Filter by Category
Search Security Terms
Content Security Policy (CSP)
Security HeadersA security standard that helps prevent cross-site scripting (XSS) attacks by allowing website owners to control which resources can be loaded and executed on their pages.
Related terms:
TLS (Transport Layer Security)
Transport SecurityA cryptographic protocol that provides secure communication over a computer network, commonly used to secure HTTPS connections.
Related terms:
CORS (Cross-Origin Resource Sharing)
Cross-Origin SecurityA security feature that allows web pages to make requests to a different domain than the one serving the web page, while maintaining security.
Related terms:
HSTS (HTTP Strict Transport Security)
Security HeadersA web security policy mechanism that helps protect websites against protocol downgrade attacks and cookie hijacking by forcing HTTPS connections.
Related terms:
XSS (Cross-Site Scripting)
Web VulnerabilitiesA type of security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Related terms:
CSRF (Cross-Site Request Forgery)
Web VulnerabilitiesAn attack that tricks a user into performing unwanted actions on a web application in which they're currently authenticated.
Related terms:
SPF (Sender Policy Framework)
Email SecurityAn email authentication method that helps prevent email spoofing by specifying which mail servers are authorized to send emails for a domain.
Related terms:
DKIM (DomainKeys Identified Mail)
Email SecurityAn email authentication method that uses digital signatures to verify that an email message was sent by an authorized sender.
Related terms:
DMARC (Domain-based Message Authentication, Reporting and Conformance)
Email SecurityAn email authentication protocol that builds on SPF and DKIM to provide domain-level protection against email spoofing.
Related terms:
Clickjacking
Web VulnerabilitiesA malicious technique where an attacker tricks a user into clicking on something different from what the user perceives, potentially revealing confidential information.
Related terms:
Mixed Content
Transport SecurityA security issue where a web page served over HTTPS contains resources (images, scripts, stylesheets) loaded over HTTP, which can compromise security.
Related terms:
Subdomain Takeover
Network SecurityA vulnerability where an attacker can take control of a subdomain by exploiting misconfigured DNS records or abandoned services.
Related terms: