Cybersecurity & Cloud Glossary
Clear, practitioner-friendly definitions for the terms security and cloud teams rely on every day.
API Security
1 definition focused on day-to-day security work.
Accessibility
1 definition focused on day-to-day security work.
Application Security
1 definition focused on day-to-day security work.
Attack Methods
2 definitions focused on day-to-day security work.
Brute Force Attack
Attack MethodsA trial-and-error method of guessing passwords, encryption keys, or credentials by systematically trying all possibilities.
Read definition →Zero-Day Vulnerability
Attack MethodsA previously unknown software vulnerability that attackers exploit before the vendor has released a patch or fix.
Read definition →Automation
4 definitions focused on day-to-day security work.
CI/CD
AutomationContinuous Integration and Continuous Deployment - automated practices for building, testing, and releasing software rapidly and reliably.
Read definition →Cron Job
AutomationA scheduled task that runs automatically at specified times or intervals on Unix-like operating systems.
Read definition →Task Automation
AutomationUsing software to perform repetitive tasks automatically, reducing manual effort and errors.
Read definition →Terraform
AutomationAn open-source infrastructure-as-code tool that enables teams to define, provision, and manage cloud infrastructure using declarative configuration files.
Read definition →Business Continuity
1 definition focused on day-to-day security work.
Business Operations
1 definition focused on day-to-day security work.
Character Encoding
1 definition focused on day-to-day security work.
Cloud Infrastructure
8 definitions focused on day-to-day security work.
API Gateway
Cloud InfrastructureA service that acts as a single entry point for API requests, handling routing, authentication, rate limiting, and other cross-cutting concerns.
Read definition →AWS (Amazon Web Services)
Cloud InfrastructureAmazon's comprehensive cloud computing platform offering over 200 services for compute, storage, databases, networking, security, and application development.
Read definition →Azure (Microsoft Azure)
Cloud InfrastructureMicrosoft's cloud computing platform providing integrated services for compute, analytics, storage, networking, AI, and enterprise applications.
Read definition →CDN (Content Delivery Network)
Cloud InfrastructureA geographically distributed network of servers that cache and deliver web content from locations closest to end users, improving performance and reliability.
Read definition →Docker
Cloud InfrastructureA platform for developing, shipping, and running applications in lightweight, portable containers that package code with all its dependencies.
Read definition →Kubernetes
Cloud InfrastructureAn open-source container orchestration platform that automates deployment, scaling, and management of containerized applications across clusters of hosts.
Read definition →Load Balancer
Cloud InfrastructureA system that distributes incoming network traffic across multiple servers to ensure high availability, reliability, and optimal resource utilization.
Read definition →Service Mesh
Cloud InfrastructureA dedicated infrastructure layer that handles service-to-service communication, providing observability, traffic management, and security without changing application code.
Read definition →Cloud Security
9 definitions focused on day-to-day security work.
AWS Security Hub
Cloud SecurityAWS service that aggregates security findings from multiple AWS services and third-party tools, providing a unified view of security posture.
Read definition →CASB (Cloud Access Security Broker)
Cloud SecurityA security solution that sits between cloud service users and cloud applications to enforce security policies, provide visibility, and protect data.
Read definition →Cloud Security Posture Management (CSPM)
Cloud SecurityContinuous monitoring and remediation of cloud misconfigurations across accounts, services, and regions.
Read definition →Cloud Workload Protection Platform (CWPP)
Cloud SecuritySecurity tooling that safeguards cloud-native workloads—containers, serverless functions, and VMs—across build and runtime.
Read definition →Cloud-Native Application Protection Platform (CNAPP)
Cloud SecurityA unified security platform that combines CSPM, CWPP, and other cloud security capabilities into a single solution.
Read definition →Microsegmentation
Cloud SecurityA network security technique that divides the network into isolated segments, applying granular access controls between workloads.
Read definition →Shared Responsibility Model
Cloud SecurityA framework that outlines which security tasks the cloud provider handles versus what the customer must secure.
Read definition →Virtual Private Cloud (VPC)
Cloud SecurityAn isolated virtual network within a cloud provider where you can launch resources with control over IP addressing, subnets, and routing.
Read definition →Web Application Firewall (WAF)
Cloud SecurityA security control that filters, monitors, and blocks HTTP/HTTPS traffic to and from web applications based on predefined rules.
Read definition →Compliance
2 definitions focused on day-to-day security work.
Data Privacy
ComplianceThe right of individuals to control how their personal information is collected, used, stored, and shared by organizations.
Read definition →NIST (National Institute of Standards and Technology)
ComplianceA U.S. federal agency that develops cybersecurity standards, guidelines, and best practices widely adopted by organizations globally.
Read definition →Compliance & Frameworks
1 definition focused on day-to-day security work.
Computer Science
2 definitions focused on day-to-day security work.
Distributed System
Computer ScienceA collection of independent computers that appear to users as a single coherent system.
Read definition →Hexadecimal (Base-16)
Computer ScienceA numbering system using 16 symbols (0-9, A-F) commonly used in computing for compact binary representation.
Read definition →Content & Design
2 definitions focused on day-to-day security work.
Content Placeholder
Content & DesignTemporary text or media used in design mockups to represent actual content before it is available.
Read definition →Web Design
Content & DesignThe process of creating the visual appearance, layout, and user experience of websites and web applications.
Read definition →Cryptography
8 definitions focused on day-to-day security work.
Caesar Cipher (ROT13)
CryptographyA simple substitution cipher that shifts letters by a fixed number of positions in the alphabet.
Read definition →Cipher Algorithm
CryptographyA mathematical procedure for encrypting and decrypting data to protect confidentiality.
Read definition →Cryptographic Hash Function
CryptographyA one-way mathematical algorithm that converts data into a fixed-size string, used for integrity verification and password storage.
Read definition →Encryption
CryptographyThe process of converting readable data (plaintext) into an unreadable format (ciphertext) using mathematical algorithms, protecting confidentiality.
Read definition →Entropy (Cryptographic)
CryptographyA measure of randomness or unpredictability in data, critical for generating secure cryptographic keys, passwords, and tokens that resist guessing attacks.
Read definition →mTLS (Mutual TLS)
CryptographyA security protocol where both client and server authenticate each other using X.509 certificates, providing bidirectional identity verification beyond standard TLS.
Read definition →TLS/SSL (Transport Layer Security / Secure Sockets Layer)
CryptographyCryptographic protocols that provide secure communication over networks by encrypting data in transit.
Read definition →XOR Cipher
CryptographyAn encryption method using the XOR (exclusive or) operation to combine plaintext with a key.
Read definition →Data Formats
2 definitions focused on day-to-day security work.
CSV Format (Comma-Separated Values)
Data FormatsCSV format is a simple text file format for tabular data where each line represents a row and columns are separated by commas.
Read definition →Data Serialization
Data FormatsThe process of converting data structures into a format that can be stored or transmitted and reconstructed later.
Read definition →Data Management
1 definition focused on day-to-day security work.
Data Protection
1 definition focused on day-to-day security work.
Data Validation
1 definition focused on day-to-day security work.
Database
1 definition focused on day-to-day security work.
Design
3 definitions focused on day-to-day security work.
Color Theory
DesignPrinciples and guidelines for combining colors to create visually harmonious and effective designs.
Read definition →RGB Color Model
DesignAn additive color model using Red, Green, and Blue light to create a spectrum of colors for digital displays.
Read definition →Typography
DesignThe art and technique of arranging type to make written language legible, readable, and visually appealing.
Read definition →DevSecOps
10 definitions focused on day-to-day security work.
Container Image
DevSecOpsA lightweight, standalone, executable package containing everything needed to run an application: code, runtime, libraries, and settings.
Read definition →Container Registry
DevSecOpsA repository for storing, managing, and distributing container images, providing version control and access management.
Read definition →Dynamic Application Security Testing (DAST)
DevSecOpsTesting a running application from the outside to discover security vulnerabilities by simulating attacks.
Read definition →Immutable Infrastructure
DevSecOpsAn infrastructure paradigm where servers are never modified after deployment; changes require replacing instances with new ones built from updated images.
Read definition →Infrastructure as Code (IaC)
DevSecOpsManaging and provisioning infrastructure through machine-readable configuration files rather than manual processes.
Read definition →Policy as Code
DevSecOpsDefining and enforcing security, compliance, and operational policies through code that can be versioned, tested, and automated.
Read definition →Runtime Security
DevSecOpsMonitoring and protecting applications during execution to detect and prevent attacks in real-time.
Read definition →Shift Left Security
DevSecOpsMoving security testing and controls earlier in the software development lifecycle to find and fix vulnerabilities sooner.
Read definition →Software Composition Analysis (SCA)
DevSecOpsIdentifying open-source components and third-party libraries in applications and detecting known vulnerabilities.
Read definition →Static Application Security Testing (SAST)
DevSecOpsAnalyzing source code, bytecode, or binaries for security vulnerabilities without executing the application.
Read definition →Development
14 definitions focused on day-to-day security work.
API (Application Programming Interface)
DevelopmentA set of rules and protocols that allows different software applications to communicate and exchange data.
Read definition →Cron Expression
DevelopmentA time-based job scheduling syntax using five or six fields to specify when tasks should run.
Read definition →DevOps
DevelopmentA set of practices combining software development (Dev) and IT operations (Ops) to shorten development cycles and deliver high-quality software continuously.
Read definition →Diff Algorithm
DevelopmentA computational method for comparing two sets of data and identifying differences between them.
Read definition →GitOps
DevelopmentAn operational framework that uses Git repositories as the single source of truth for declarative infrastructure and application configurations.
Read definition →JSON (JavaScript Object Notation)
DevelopmentA lightweight data interchange format using human-readable text to represent structured data.
Read definition →Markdown
DevelopmentA lightweight markup language that uses plain text formatting to create structured documents.
Read definition →Regular Expressions (Regex)
DevelopmentPattern-matching syntax used to search, validate, and manipulate text based on rules.
Read definition →Semantic Versioning (Semver)
DevelopmentA versioning scheme using MAJOR.MINOR.PATCH format that communicates the scope and impact of changes, enabling predictable dependency management.
Read definition →Text Diff (Difference)
DevelopmentA comparison showing line-by-line or character-by-character changes between two versions of text.
Read definition →Universally Unique Identifier (UUID)
DevelopmentA 128-bit identifier guaranteed to be unique across space and time without central coordination.
Read definition →Unix Timestamp
DevelopmentThe number of seconds elapsed since January 1, 1970 00:00:00 UTC (the Unix epoch).
Read definition →Version Control
DevelopmentA system that tracks changes to files over time, enabling collaboration, history tracking, and the ability to revert to previous states.
Read definition →Webhook
DevelopmentAn HTTP callback that delivers real-time data from one application to another when a specific event occurs.
Read definition →Digital Marketing
1 definition focused on day-to-day security work.
Email Security
7 definitions focused on day-to-day security work.
DKIM (DomainKeys Identified Mail)
Email SecurityEmail authentication method that uses cryptographic signatures to verify that email content has not been tampered with in transit.
Read definition →DMARC (Domain-based Message Authentication, Reporting, and Conformance)
Email SecurityEmail validation system that builds on SPF and DKIM to prevent email spoofing and provide reporting on email authentication failures.
Read definition →Email Authentication
Email SecurityA set of protocols (SPF, DKIM, DMARC) that verify the sender of an email is who they claim to be, preventing spoofing and phishing.
Read definition →Email Headers
Email SecurityMetadata attached to emails that shows routing information, authentication results, and delivery path.
Read definition →Integrated Cloud Email Security (ICES)
Email SecurityAPI-based email security solutions that integrate directly with cloud email platforms like Google Workspace and Microsoft 365, rather than routing mail through an external gateway.
Read definition →Secure Email Gateway (SEG)
Email SecurityA security solution that filters incoming and outgoing email traffic to protect against spam, phishing, malware, and data loss.
Read definition →SPF (Sender Policy Framework)
Email SecurityEmail authentication method that specifies which mail servers are authorized to send email on behalf of your domain.
Read definition →Encoding
2 definitions focused on day-to-day security work.
Base64 Encoding
EncodingA binary-to-text encoding scheme that converts binary data into ASCII characters for safe transmission over text-based protocols.
Read definition →URL Encoding (Percent Encoding)
EncodingA mechanism for encoding special characters in URLs using percent signs followed by hexadecimal values.
Read definition →File Formats
1 definition focused on day-to-day security work.
Forensics
1 definition focused on day-to-day security work.
Identity & Access Management
10 definitions focused on day-to-day security work.
Authentication vs Authorization
Identity & Access ManagementAuthentication verifies who you are, while authorization determines what you can do.
Read definition →FIDO2
Identity & Access ManagementAn open authentication standard that enables passwordless and phishing-resistant login using hardware security keys or platform authenticators.
Read definition →Identity and Access Management (IAM)
Identity & Access ManagementThe policies and technologies used to verify identities, govern permissions, and log access across systems.
Read definition →Kerberos
Identity & Access ManagementA network authentication protocol that uses secret-key cryptography and trusted third parties to verify user and service identities without transmitting passwords.
Read definition →LDAP (Lightweight Directory Access Protocol)
Identity & Access ManagementAn open, vendor-neutral protocol for accessing and maintaining distributed directory services over a network.
Read definition →Multi-Factor Authentication (MFA)
Identity & Access ManagementAn authentication method that requires users to provide two or more verification factors to gain access.
Read definition →OAuth (Open Authorization)
Identity & Access ManagementAn open standard for delegated access authorization that allows applications to access user resources without exposing credentials.
Read definition →OIDC (OpenID Connect)
Identity & Access ManagementAn identity layer built on OAuth 2.0 that enables applications to verify user identity and obtain basic profile information through a standardized protocol.
Read definition →Privileged Access Management (PAM)
Identity & Access ManagementA framework for securing and auditing accounts with elevated permissions, such as admins, service accounts, and break-glass users.
Read definition →Session Management
Identity & Access ManagementThe process of securely maintaining user state and authentication across multiple HTTP requests.
Read definition →Incident Response
2 definitions focused on day-to-day security work.
Credential Compromise
Incident ResponseA security incident where authentication credentials (passwords, API keys, tokens) are stolen, exposed, or otherwise obtained by unauthorized parties.
Read definition →Cryptomining Attack
Incident ResponseAn attack where adversaries use compromised cloud resources to mine cryptocurrency, resulting in significant compute costs for the victim.
Read definition →Infrastructure
1 definition focused on day-to-day security work.
Networking
14 definitions focused on day-to-day security work.
BGP (Border Gateway Protocol)
NetworkingThe routing protocol that exchanges network reachability information between autonomous systems, forming the backbone of Internet routing.
Read definition →DNS
NetworkingThe Domain Name System translates human-readable domain names into IP addresses that computers use to connect to websites and services.
Read definition →DNSSEC (DNS Security Extensions)
NetworkingA suite of specifications that add cryptographic authentication to DNS responses, preventing DNS spoofing and cache poisoning attacks.
Read definition →Domain Name System (DNS)
NetworkingThe hierarchical naming system that translates human-readable domain names into IP addresses.
Read definition →IP Address Geolocation
NetworkingThe process of determining the geographic location of an internet-connected device using its IP address.
Read definition →MAC Address
NetworkingA unique hardware identifier assigned to network interfaces for local network communication.
Read definition →MX Record
NetworkingA DNS record type that specifies which mail servers are responsible for receiving email for a domain.
Read definition →Network Interface Card (NIC)
NetworkingA hardware component that connects a computer or device to a network, enabling communication through its unique MAC address.
Read definition →Network Protocol
NetworkingA set of rules defining how data is transmitted and received over a network.
Read definition →OUI (Organizationally Unique Identifier)
NetworkingThe first three bytes of a MAC address, assigned by IEEE to identify the manufacturer of a network device.
Read definition →Port Numbers
NetworkingNumerical identifiers (0-65535) used to route network traffic to specific services on a device.
Read definition →Subnet Mask
NetworkingA 32-bit number that divides an IP address into network and host portions for routing.
Read definition →TTL (Time to Live)
NetworkingA value that specifies how long a DNS record or network packet should be cached or forwarded before being discarded or refreshed.
Read definition →WHOIS Database
NetworkingA public directory that stores registration information for domain names and IP address blocks.
Read definition →Networking & DNS
1 definition focused on day-to-day security work.
PKI & Certificates
3 definitions focused on day-to-day security work.
Certificate Transparency (CT)
PKI & CertificatesA public logging system that records all SSL/TLS certificates, enabling detection of misissued or malicious certificates.
Read definition →Public Key Infrastructure (PKI)
PKI & CertificatesA framework of policies, processes, and technologies for managing digital certificates and public-key encryption.
Read definition →X.509 Certificate
PKI & CertificatesA digital certificate standard that binds a public key to an identity, enabling encrypted connections and authentication.
Read definition →Privacy
1 definition focused on day-to-day security work.
Risk & Compliance
4 definitions focused on day-to-day security work.
Compliance Penalty
Risk & ComplianceFinancial fines and sanctions imposed for failing to meet regulatory data protection and security requirements.
Read definition →GDPR
Risk & ComplianceThe General Data Protection Regulation is the EU's comprehensive data privacy law that governs how organizations collect, process, and protect personal data.
Read definition →HIPAA
Risk & ComplianceThe Health Insurance Portability and Accountability Act establishes standards for protecting sensitive patient health information in the United States.
Read definition →SOC 2
Risk & ComplianceService Organization Control 2 is an auditing standard for service providers that store customer data, focusing on security, availability, processing integrity, confidentiality, and privacy.
Read definition →Risk & Resilience
10 definitions focused on day-to-day security work.
Business Impact Analysis (BIA)
Risk & ResilienceAn assessment that identifies critical business processes and quantifies the impact of their disruption.
Read definition →Cyber Insurance
Risk & ResilienceInsurance coverage that protects organizations against financial losses from cyberattacks and data breaches.
Read definition →Data Breach Cost
Risk & ResilienceThe total financial impact of a security incident, including detection, response, notification, and long-term damages.
Read definition →Incident Response Plan (IRP)
Risk & ResilienceA documented, tested approach for detecting, containing, and recovering from cybersecurity incidents.
Read definition →MITRE ATT&CK Framework
Risk & ResilienceA globally accessible knowledge base of adversary tactics, techniques, and procedures mapped to the attack lifecycle.
Read definition →Ransomware
Risk & ResilienceMalware that encrypts systems or exfiltrates data, demanding payment to restore access or prevent disclosure.
Read definition →Recovery Point Objective (RPO)
Risk & ResilienceThe maximum acceptable amount of data loss measured in time, defining how far back systems must be restored after an incident.
Read definition →Recovery Time Objective (RTO)
Risk & ResilienceThe maximum acceptable downtime for a system or service before business impact becomes unacceptable.
Read definition →Return on Security Investment (ROSI)
Risk & ResilienceA metric that quantifies the financial benefit of security investments relative to their cost.
Read definition →Risk Assessment
Risk & ResilienceA systematic process of identifying, analyzing, and evaluating cybersecurity risks to inform treatment decisions.
Read definition →Security
1 definition focused on day-to-day security work.
Security Foundations
5 definitions focused on day-to-day security work.
Attack Surface
Security FoundationsThe total number of points where an unauthorized user could try to enter data into, or extract data from, an environment.
Read definition →Authentication
Security FoundationsThe process of verifying the identity of a user, device, or system before granting access to resources or services.
Read definition →Principle of Least Privilege (PoLP)
Security FoundationsThe practice of granting users and services the minimum access they need to perform their duties.
Read definition →Vulnerability
Security FoundationsA weakness in a system, application, or process that could be exploited by a threat actor to gain unauthorized access or cause harm.
Read definition →Zero Trust Architecture
Security FoundationsA security model that assumes breach, requiring continuous verification of every user, device, and workload regardless of location.
Read definition →Security Infrastructure
3 definitions focused on day-to-day security work.
Certificate Authority (CA)
Security InfrastructureA trusted entity that issues, validates, and revokes digital certificates used for secure communications.
Read definition →Firewall
Security InfrastructureA security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Read definition →VPN (Virtual Private Network)
Security InfrastructureAn encrypted network connection that creates a secure tunnel between a device and a remote network over the internet.
Read definition →Security Operations
10 definitions focused on day-to-day security work.
Chronicle Security Operations
Security OperationsGoogle Cloud security analytics platform that provides threat detection, investigation, and response using Google infrastructure and intelligence.
Read definition →Endpoint Detection and Response (EDR)
Security OperationsSecurity software that monitors endpoints for malicious activity, enabling rapid detection and containment.
Read definition →Managed Detection and Response (MDR)
Security OperationsA security service that combines technology and human expertise to detect, investigate, and respond to threats 24/7.
Read definition →Microsoft Sentinel
Security OperationsMicrosoft cloud-native SIEM and SOAR solution that provides intelligent security analytics and threat detection across the enterprise.
Read definition →SBOM (Software Bill of Materials)
Security OperationsA comprehensive inventory of all components, libraries, and dependencies that make up a software application, enabling transparency in the software supply chain.
Read definition →Secrets Management
Security OperationsThe practice and tooling for securely storing, accessing, rotating, and auditing sensitive credentials like API keys, passwords, certificates, and encryption keys.
Read definition →Security Information and Event Management (SIEM)
Security OperationsA platform that ingests security telemetry, correlates events, and surfaces alerts for investigation.
Read definition →Security Operations Center (SOC)
Security OperationsA dedicated function responsible for monitoring, detecting, and responding to cybersecurity threats in real time.
Read definition →Virtual Chief Information Security Officer (vCISO)
Security OperationsAn outsourced executive who provides strategic cybersecurity leadership and governance without the cost of a full-time hire.
Read definition →Vulnerability Management
Security OperationsThe continuous process of identifying, prioritizing, and remediating security weaknesses in systems and applications.
Read definition →Security Testing
1 definition focused on day-to-day security work.
Threat Intelligence
9 definitions focused on day-to-day security work.
Advanced Persistent Threat (APT)
Threat IntelligenceA sophisticated, long-term cyberattack where an intruder gains unauthorized access and remains undetected for an extended period to steal data or cause damage.
Read definition →Credential Stuffing
Threat IntelligenceAn automated attack that uses stolen username/password pairs from data breaches to gain unauthorized access to user accounts on other services.
Read definition →IP Reputation
Threat IntelligenceA trustworthiness score (0-100) assigned to IP addresses based on observed malicious behavior, spam activity, and threat intelligence data.
Read definition →Keylogger
Threat IntelligenceMalicious software or hardware that secretly records keystrokes to capture passwords, credit card numbers, and other sensitive information typed by users.
Read definition →Malware
Threat IntelligenceMalicious software designed to damage, disrupt, or gain unauthorized access to computer systems and data.
Read definition →Phishing
Threat IntelligenceA social engineering attack that uses fraudulent communications to trick recipients into revealing sensitive information or installing malware.
Read definition →Supply Chain Attack
Threat IntelligenceA cyberattack that targets less-secure elements in an organization's supply chain—vendors, software dependencies, or service providers—to compromise the ultimate target.
Read definition →Threat Intelligence
Threat IntelligenceEvidence-based knowledge about existing or emerging threats used to inform security decisions and response.
Read definition →URL/Domain Defanging
Threat IntelligenceA technique to render URLs and IPs non-clickable by replacing characters, preventing accidental access to malicious sites.
Read definition →Utilities
3 definitions focused on day-to-day security work.
Lorem Ipsum
UtilitiesPlaceholder text used in design and publishing to demonstrate visual form without meaningful content.
Read definition →QR Code
UtilitiesA two-dimensional barcode that stores data in a matrix pattern, readable by cameras and smartphones.
Read definition →Timezone Conversion
UtilitiesThe process of translating time from one geographic timezone to another, accounting for UTC offsets and daylight saving time.
Read definition →Vulnerability Management
1 definition focused on day-to-day security work.
Web Security
11 definitions focused on day-to-day security work.
CORS (Cross-Origin Resource Sharing)
Web SecurityA browser security mechanism that controls how web pages can request resources from different domains, preventing unauthorized cross-site data access.
Read definition →Cross-Site Request Forgery (CSRF)
Web SecurityAn attack that tricks a victim into submitting unauthorized requests using their authenticated session.
Read definition →Cross-Site Scripting (XSS)
Web SecurityA web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.
Read definition →HTML Entity Encoding
Web SecurityA method of representing special characters in HTML using named or numeric references to prevent interpretation as code.
Read definition →HTTP Cookie
Web SecuritySmall pieces of data stored by web browsers, used for session management, personalization, and tracking.
Read definition →HTTP Security Headers
Web SecurityResponse headers that enable browser security protections against common web attacks.
Read definition →JSON Web Token (JWT)
Web SecurityA compact, URL-safe token format used to securely transmit claims between parties in web applications.
Read definition →Reverse Proxy
Web SecurityA server that sits in front of backend servers, forwarding client requests and returning responses while hiding the origin server's identity.
Read definition →Subresource Integrity (SRI)
Web SecurityA security feature that allows browsers to verify that files from CDNs have not been tampered with.
Read definition →Typosquatting
Web SecurityRegistering domain names similar to popular sites by exploiting common typing errors to deceive users.
Read definition →URL Redirection
Web SecurityA technique that forwards users from one URL to another, often used for site migrations or link shortening.
Read definition →Web Technologies
5 definitions focused on day-to-day security work.
API Endpoint
Web TechnologiesA specific URL where an API can be accessed, representing a function or resource in a web service.
Read definition →HTTP Status Codes
Web TechnologiesThree-digit codes returned by web servers to indicate the result of an HTTP request.
Read definition →Link Rot
Web TechnologiesThe phenomenon where hyperlinks become permanently unavailable as web pages are moved or deleted.
Read definition →URL (Uniform Resource Locator)
Web TechnologiesA web address that specifies the location of a resource on the internet, composed of protocol, domain, path, and optional parameters.
Read definition →User Agent String
Web TechnologiesA text string sent by web browsers to identify the browser, operating system, and device to web servers.
Read definition →Web Tools
1 definition focused on day-to-day security work.