Security Glossary

38 security terms explained in plain language. Understand the vulnerabilities, defenses, and concepts that matter when building and deploying web applications.

C

Certificate Pinning

Certificate pinning is a security technique where an application associates a specific cryptographic certificate or public key with a host, rejecting connections if the server presents a different certificate, even if it is technically valid.

Clickjacking

Clickjacking is a visual deception attack where a malicious website places transparent iframes over visible content, tricking users into clicking hidden elements that perform unintended actions on a target site.

Content Security Policy (CSP)

Content Security Policy is an HTTP response header that instructs browsers to only load resources (scripts, styles, images, fonts) from explicitly approved sources, providing a strong defense against XSS and data injection attacks.

Content Security Policy (CSP)

Content Security Policy is a security standard implemented via HTTP headers that allows web applications to declare which content sources are trusted, providing granular control over script execution, resource loading, and frame embedding.

Cross-Origin Resource Sharing (CORS)

CORS is a browser security mechanism that controls which external domains can make requests to your API by using HTTP headers to relax the same-origin policy selectively.

Cross-Origin Resource Sharing (CORS)

CORS is an HTTP header-based mechanism that allows servers to indicate which origins are permitted to read their responses, providing a controlled way to relax the same-origin policy for legitimate cross-origin requests.

Cross-Site Request Forgery (CSRF)

CSRF is an attack that forces an authenticated user's browser to send unintended requests to a web application where they are currently logged in.

Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS) is a vulnerability that allows attackers to inject malicious client-side scripts into web pages viewed by other users.

Cryptographic Failures

Cryptographic failures occur when sensitive data is not properly protected through encryption, hashing, or key management, leading to data exposure, integrity violations, or authentication bypasses.

S

Same-Origin Policy

The same-origin policy is a fundamental browser security mechanism that restricts how documents and scripts from one origin can interact with resources from another origin, preventing malicious sites from accessing data on other sites.

SameSite Cookies

SameSite is a cookie attribute that controls whether the browser sends the cookie with cross-site requests, providing built-in CSRF protection by restricting when cookies travel across site boundaries.

Secret Management

Secret management is the practice of securely storing, accessing, distributing, and rotating sensitive credentials like API keys, database passwords, encryption keys, and service tokens throughout an application's lifecycle.

Secure Cookies

The Secure attribute on a cookie instructs the browser to only include the cookie in requests sent over HTTPS encrypted connections, preventing the cookie from being transmitted in plaintext over HTTP.

Security Headers

Security headers are HTTP response headers that instruct browsers to enable specific security features, providing defense-in-depth against common web attacks like XSS, clickjacking, and data leakage.

Security Misconfiguration

Security misconfiguration is a broad vulnerability category where insecure default settings, incomplete configurations, verbose error messages, or unnecessary features leave an application exposed to attack.

Server-Side Request Forgery (SSRF)

SSRF is a vulnerability where an attacker tricks a server into making HTTP requests to unintended destinations, typically internal resources that are not directly accessible from the internet.

Session Hijacking

Session hijacking is an attack where an adversary takes over a legitimate user's session by obtaining or forging their session identifier, gaining unauthorized access to their account.

SQL Injection

SQL injection is a code injection attack where malicious SQL statements are inserted into application queries through unsanitized user input, allowing attackers to read, modify, or delete database contents.

Subresource Integrity (SRI)

Subresource Integrity is a browser security feature that verifies resources loaded from external sources (CDNs, third-party hosts) have not been tampered with, by comparing the resource content against a cryptographic hash embedded in the HTML.

Find Vulnerabilities in Your App

Knowing the terms is the first step. Run an automated scan to see which vulnerabilities affect your app.

Get Starter Scan