Complete Cyber Security Jargons by Appknox
Appknox’s Cybersecurity Jargons presents a comprehensive collection of the most important cybersecurity glossary and meanings used in the field of cyber security whether it be mobile application security testing or other. The glossary of cyber security was created as an initiative for our clients to offer rapid access to critical cybersecurity terminology. In a world where cyberattacks have become an obvious threat to our daily lives, service providers must protect clients who wish to safeguard their families and companies from cyber threats and exposure to invasive sites with foreign materials. You can read about Appknox's products and tools like static code analysis tools, DAST tools, API security testing tools, manual software testing tools, vulnerability assessment tools, and pen testing tools and protect your mobile data with Appknox's security.
- A
- Agile
- API (Application Programming Interface)
- API Security
- Application Security Testing
- ARP Spoofing
- B
- Binary Code Analysis
- Black-Hat Hacker
- Bot/Botnet
- Breach
- Brute Force Attack
- C
- Cache Poisoning
- CI/CD
- Clickjacking
- Code Injection
- Command Injection
- Common Vulnerability Exposure (CVE)
- Container Security
- Cross-site scripting
- CSRF Attacks
- CWE 73: External Control of Filename or Path?
- CWE 78- OS Command Injection: Understanding the Risks and Mitigation
- Cybersecurity Compliance
- D
- Data Security
- DNS Spoofing
- Dynamic Analysis
- E
- Error Message Vulnerabilities
- Ethical Hacking
- Exploit
- F
- Firewall
- H
- HIPAA - Health Insurance Portability and Accountability Act of 1996
- I
- Improper Output Sanitization for Logs
- Insecure Direct Object Reference
- Issue Severity
- M
- Malicious code
- Malware
- Microservices
- Mitigation
- N
- National Vulnerability Database
- O
- Open Redirects
- Open Source Software
- P
- Patching
- Penetration Testing
- Phishing
- Q
- Quality Assurance
- Quality Control
- R
- Ransomware
- Rootkit
- S
- Secure Coding
- Security Operations Center (SOC)
- SIEM
- Social Engineering Attack
- Software as a Service (SaaS)
- Software Vulnerability
- Software Weakness
- Source Code Analysis
- Spyware
- Static Application Security Testing
- T
- Threat Intelligence
- Threat Modelling
- Trojan Horse
- V
- Viruses
Gartner and G2 recommends Appknox | See how Appknox can help you with a free Demo!
DISCOVER MORE
-
December 12, 2024
Top Mobile App Security Standards to Follow in 2025
-
December 2, 2024
Best Mobile App Security Testing Tools for Enterprises
-
November 15, 2024
Top 7 DAST Tools for Mobile Apps in 2025