2FA
Two-Factor Authentication
A security process requiring two distinct forms of identification — typically a password and a code from a separate device.
SecurityAES
Advanced Encryption Standard
A symmetric block cipher used worldwide for encrypting sensitive data, with key sizes of 128, 192, or 256 bits.
SecurityArgon2
Argon2 Key Derivation Function
The winner of the Password Hashing Competition, designed to be memory-hard and resistant to GPU cracking attacks.
SecurityCertificate Pinning
TLS Certificate Pinning
A technique that associates a host with its expected certificate, preventing man-in-the-middle attacks with forged certificates.
SecurityChecksum
File Checksum
A value computed from file data used to verify that the file hasn't been altered or corrupted.
SecurityClickjacking
UI Redress Attack
An attack that tricks users into clicking hidden elements by overlaying invisible frames on top of legitimate page content.
SecurityCommand Injection
OS Command Injection
An attack passing arbitrary operating system commands through a vulnerable application to the host system.
SecurityCORS Misconfiguration
CORS Security Misconfiguration
Overly permissive CORS headers allowing unauthorized origins to read sensitive API responses in the browser.
SecurityCSRF
Cross-Site Request Forgery
An attack tricking an authenticated user into submitting unintended requests to a web application.
SecurityCVE
Common Vulnerabilities and Exposures
A standardized catalog of publicly known security vulnerabilities, each assigned a unique CVE-YYYY-NNNNN identifier.
SecurityDDoS
Distributed Denial of Service
An attack that overwhelms a server or network with traffic from many distributed sources, making it unavailable to legitimate users.
SecurityDefense in Depth
Defense in Depth Strategy
A security approach using multiple layers of protection so that if one layer fails, others still provide defense.
SecurityE2EE
End-to-End Encryption
A communication system where only the sender and recipient can read messages, with encryption keys never accessible to intermediary servers.
SecurityEntropy
Password Entropy
A measure of randomness or unpredictability in a password, expressed in bits, indicating resistance to guessing.
SecurityFIDO2
Fast Identity Online 2
An authentication standard enabling passwordless login through hardware security keys or biometrics using public key cryptography.
SecurityHMAC
Hash-based Message Authentication Code
A mechanism combining a cryptographic hash with a secret key to verify data integrity and authenticity.
SecurityHSTS
HTTP Strict Transport Security
An HTTP header instructing browsers to only connect via HTTPS, preventing protocol downgrade attacks.
SecurityInsecure Deserialization
A vulnerability where untrusted data is deserialized without validation, potentially enabling remote code execution.
SecurityKey Derivation
Key Derivation Function
A function that derives one or more secret keys from a password or passphrase using a pseudorandom function.
SecurityNonce
Number Used Once
A random or sequential value used exactly once in cryptographic operations to prevent replay attacks and ensure message freshness.
SecurityOWASP Top 10
OWASP Top Ten Web Risks
A regularly updated list of the ten most critical web application security risks, published by the Open Web Application Security Project.
SecurityPassword Hashing
Converting passwords into fixed-length hashes using algorithms like bcrypt or Argon2 for secure storage.
SecurityPath Traversal
Directory Traversal Attack
Exploiting insufficient input validation to access files outside the intended directory using ../ sequences.
SecurityPenetration Testing
Penetration Testing (Pentest)
Simulating real-world attacks against a system to identify security vulnerabilities before malicious actors do.
SecurityPGP
Pretty Good Privacy
An encryption program providing cryptographic privacy and authentication for data communication.
SecurityPKI
Public Key Infrastructure
A framework of certificate authorities, digital certificates, and key pairs that enables secure encrypted communication and identity verification.
SecurityPublic Key
Public Key Cryptography
A cryptographic system using paired keys where the public key encrypts and only the private key can decrypt.
SecurityQR Code
Quick Response Code
A two-dimensional barcode that stores data (URLs, text, contact info) readable by cameras and scanners.
SecurityRBAC
Role-Based Access Control
An authorization model that assigns permissions to roles rather than individual users, simplifying access management at scale.
SecurityRSA
Rivest-Shamir-Adleman
An asymmetric cryptographic algorithm using public/private key pairs for encryption and digital signatures.
SecuritySalt
Cryptographic Salt
Random data added to a password before hashing to ensure identical passwords produce different hashes.
SecuritySandbox
Security Sandbox
An isolated execution environment that restricts a program's access to system resources, limiting the impact of malicious code.
SecuritySensitive Data Exposure
A vulnerability where applications fail to adequately protect sensitive data like passwords, tokens, or PII in transit or at rest.
SecuritySHA-256
Secure Hash Algorithm 256-bit
A cryptographic hash function producing a 256-bit digest, widely used for data integrity verification.
SecuritySQL Injection
SQL Injection Attack
Inserting malicious SQL code into application queries to access, modify, or delete database data.
SecuritySRI
Subresource Integrity
An HTML attribute providing a cryptographic hash to verify that fetched resources have not been tampered with.
SecuritySSL/TLS
Secure Sockets Layer / Transport Layer Security
Cryptographic protocols providing secure communication over networks, used for HTTPS.
SecuritySSRF
Server-Side Request Forgery
An attack making the server send requests to unintended internal or external resources on behalf of the attacker.
SecuritySteganography
Digital Steganography
The practice of hiding secret data within ordinary files (images, audio) without visible change.
SecurityThreat Modeling
Security Threat Modeling
A structured process for identifying potential threats, attack vectors, and mitigations during system design.
SecurityTOTP
Time-based One-Time Password
A temporary passcode generated from a shared secret and the current time, used in two-factor authentication.
SecurityWAF
Web Application Firewall
A security layer that filters HTTP traffic between a web application and the internet, blocking common attacks like SQL injection and XSS.
SecurityXSS
Cross-Site Scripting
An attack injecting malicious scripts into web pages viewed by other users, stealing data or session tokens.
SecurityXXE
XML External Entity Attack
An attack exploiting XML parsers to access local files, perform SSRF, or cause denial of service via entity expansion.
SecurityZero-Day
Zero-Day Vulnerability
A software vulnerability unknown to the vendor and without a patch, actively exploited before a fix is available.
Security