C

Cross-Site Request Forgery: a type of web security vulnerability where an attacker tricks a user into performing unintended actions on a web application they're authenticated with. Protection involves...

Definition
E

The process of converting plaintext data into an unreadable format (ciphertext) using an algorithm and a key, so that only authorized parties with the correct decryption key can access the original in...

Definition
F

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It establishes a barrier between a trusted internal network and untrus...

Definition
O

An open authorization framework that allows third-party applications to access a user's resources without exposing their credentials. OAuth 2.0 defines authorization flows for web apps, mobile apps, d...

Definition
S

Secure Sockets Layer / Transport Layer Security: cryptographic protocols that provide secure communication over a computer network. TLS (the successor to SSL) encrypts data in transit between web brow...

Definition
V

Virtual Private Network: a technology that creates an encrypted tunnel between a user's device and a remote server, masking the user's IP address and securing data in transit. VPNs are used for privac...

Definition
X

Cross-Site Scripting: a web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. XSS attacks can steal session cookies, redirect users, or def...

Definition
Z

A security framework that requires all users, whether inside or outside the organization's network, to be authenticated, authorized, and continuously validated before being granted access to applicati...

Definition