Web Security Glossary

85 security terms explained in plain English

Cryptography & Transport

6 terms

Email Security

6 terms

Web Security

14 terms
CORS

Cross-Origin Resource Sharing (CORS) is a browser security mechanism that restricts web pages from making requests to a different domain than the one that served the page.

CSRF

Cross-Site Request Forgery (CSRF) is an attack where a malicious website tricks a user's browser into sending authenticated requests to another site where the user is logged in.

XSS

Cross-Site Scripting (XSS) is a web vulnerability where attackers inject malicious scripts into content that is then executed in victims' browsers.

SQL Injection

SQL Injection is an attack where malicious SQL statements are inserted into input fields to manipulate a database query.

IDOR

Insecure Direct Object Reference (IDOR) is an access control vulnerability where an application exposes internal object references (like database IDs) without verifying that the requesting user is authorized to access that object.

SSRF

Server-Side Request Forgery (SSRF) is a vulnerability where an attacker can make the server initiate requests to arbitrary URLs, including internal services not accessible from the internet.

RCE

Remote Code Execution (RCE) is a critical class of vulnerability that allows an attacker to run arbitrary code on a target server or system.

LFI

Local File Inclusion (LFI) is a vulnerability that allows an attacker to include files from the server's local filesystem through a web application, often by manipulating a file path parameter.

Path Traversal

A path traversal attack (also known as directory traversal) uses sequences like .

Clickjacking

Clickjacking is an attack where a malicious page embeds a legitimate site in an invisible iframe and tricks users into clicking on its controls while thinking they're interacting with the malicious page.

Open Redirect

An open redirect vulnerability allows an attacker to craft a URL on a trusted domain that redirects users to an arbitrary external URL.

XXE

XML External Entity (XXE) injection is a vulnerability that exploits weakly configured XML parsers that process external entity references.

Deserialization

Insecure deserialization occurs when an application deserializes untrusted data without proper validation, potentially allowing attackers to manipulate serialized objects to achieve arbitrary code execution, authentication bypass, or data tampering.

Prototype Pollution

Prototype pollution is a JavaScript-specific vulnerability where an attacker can inject properties into the Object.

Authentication & Identity

14 terms
JWT

JSON Web Token (JWT) is a compact, URL-safe token format used to represent claims between two parties, commonly used for authentication and authorization.

OAuth

OAuth 2.

SAML

Security Assertion Markup Language (SAML) is an XML-based open standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider (SP).

SSO

Single Sign-On (SSO) is an authentication scheme that allows users to log in once and gain access to multiple related applications without re-entering credentials.

MFA

Multi-Factor Authentication (MFA) requires users to verify their identity using two or more factors: something they know (password), something they have (phone/hardware key), or something they are (biometric).

TOTP

Time-based One-Time Password (TOTP) is an MFA mechanism that generates a 6-digit code using a shared secret and the current time, rotating every 30 seconds.

WebAuthn

Web Authentication (WebAuthn) is a W3C standard that enables password-less or second-factor authentication using public-key cryptography and hardware authenticators like security keys (YubiKey) or platform authenticators (Face ID, Touch ID).

Passkeys

Passkeys are a FIDO2/WebAuthn-based credential that replace passwords entirely, using device-stored cryptographic keys synced via iCloud Keychain, Google Password Manager, or similar.

API Key

An API key is a simple secret token used to authenticate requests to an API, typically passed as a query parameter or HTTP header.

Bearer Token

A bearer token is an access token passed in the HTTP Authorization header as "Authorization: Bearer <token>".

Session Cookie

A session cookie is a small piece of data stored in the browser that the server uses to identify an authenticated user's session.

HttpOnly

The HttpOnly flag is a cookie attribute that prevents JavaScript from accessing the cookie via document.

SameSite

The SameSite cookie attribute controls when cookies are sent with cross-site requests, providing protection against CSRF attacks.

Secure Flag

The Secure flag on a cookie instructs browsers to only send the cookie over HTTPS connections, never over plain HTTP.

Headers & Policies

5 terms

Compliance & Frameworks

7 terms

Security Testing

6 terms

Architecture & Design

12 terms
Zero Trust

Zero Trust is a security model based on the principle "never trust, always verify" — assuming no user, device, or network segment is inherently trusted, even inside the corporate perimeter.

Least Privilege

The principle of least privilege states that users, processes, and systems should be granted only the minimum access rights needed to perform their function, and no more.

Defense in Depth

Defense in depth is a security strategy that layers multiple defensive mechanisms so that if one control fails, others remain to prevent or limit the impact of an attack.

Security by Design

Security by design means building security into systems from the earliest design stages rather than adding it as an afterthought.

Encryption at Rest

Encryption at rest refers to encrypting data when it is stored, protecting it from unauthorized access if physical media is lost or stolen or if a cloud storage bucket is misconfigured.

Encryption in Transit

Encryption in transit protects data as it moves between systems, preventing interception by network attackers.

Key Management

Key management refers to the processes and systems for generating, storing, distributing, rotating, and revoking cryptographic keys.

HSM

A Hardware Security Module (HSM) is a physical computing device that safeguards and manages cryptographic keys within a tamper-resistant hardware environment.

SBOM

A Software Bill of Materials (SBOM) is a formal, machine-readable inventory of all components, libraries, and dependencies included in a software product, analogous to an ingredient list for food.

Supply Chain Security

Software supply chain security encompasses the practices, policies, and tools used to protect the integrity of code and components throughout the software development lifecycle — from source code and build systems to package repositories and deployment pipelines.

Dependency Confusion

Dependency confusion is a supply chain attack where an attacker publishes a malicious package to a public registry (npm, PyPI, RubyGems) using the same name as an internal private package.

Typosquatting

Typosquatting is a type of attack where adversaries register domain names or publish packages with names similar to legitimate ones, betting that users will accidentally use the malicious version due to typos.

DNS & Network

9 terms
Subdomain Takeover

A subdomain takeover occurs when a DNS record points to an external service (like a deprovisioned Heroku app, GitHub Pages site, or S3 bucket) that an attacker can claim.

DNS Hijacking

DNS hijacking is an attack where an attacker modifies DNS records to redirect traffic to a malicious server.

Cache Poisoning

DNS cache poisoning (also known as DNS spoofing) is an attack where forged DNS responses are inserted into a resolver's cache, causing it to return malicious IP addresses for legitimate domains.

ARP Spoofing

ARP spoofing (or ARP poisoning) is a local network attack where an attacker sends fake ARP (Address Resolution Protocol) messages to associate their MAC address with a legitimate IP address, enabling man-in-the-middle attacks on the local network.

WAF

A Web Application Firewall (WAF) inspects HTTP/S traffic between a web application and the internet, blocking common attacks like SQL injection, XSS, CSRF, and bot traffic.

Rate Limiting

Rate limiting controls how many requests a user or IP address can make to an API or web application within a given time window, protecting against brute-force attacks, credential stuffing, scraping, and denial-of-service.

DDoS

A Distributed Denial of Service (DDoS) attack floods a target server, service, or network with traffic from multiple sources to overwhelm its capacity and make it unavailable to legitimate users.

CDN Security

CDN (Content Delivery Network) security refers to the security capabilities provided by CDN providers, including DDoS mitigation, WAF, bot management, TLS termination, and edge caching.

TLS Termination

TLS termination is the process of decrypting TLS-encrypted traffic at a load balancer, reverse proxy, or CDN edge node, before forwarding the decrypted request to backend servers.

Incident Response

6 terms

Check your site for these issues

Run a free security scan to see which vulnerabilities and misconfigurations affect your domain.