Complete Cyber Security Jargons by Appknox
Appknox’s Cybersecurity Jargons presents a comprehensive collection of the most important cybersecurity glossary and meanings used in the field of cyber security whether it be mobile application security testing or other. The glossary of cyber security was created as an initiative for our clients to offer rapid access to critical cybersecurity terminology. In a world where cyberattacks have become an obvious threat to our daily lives, service providers must protect clients who wish to safeguard their families and companies from cyber threats and exposure to invasive sites with foreign materials. You can read about Appknox's products and tools like static code analysis tools, DAST tools, API security testing tools, manual software testing tools, vulnerability assessment tools, and pen testing tools and protect your mobile data with Appknox's security.
- A
- Agile
- API (Application Programming Interface)
- API Security
- Application Security Testing
- ARP Spoofing
- B
- Binary Code Analysis
- Black-Hat Hacker
- Bot/Botnet
- Breach
- Brute Force Attack
- C
- Cache Poisoning
- CI/CD
- Clickjacking
- Code Injection
- Command Injection
- Common Vulnerability Exposure (CVE)
- Container Security
- Cross-site scripting
- CSRF Attacks
- CWE 78- OS Command Injection: Understanding the Risks and Mitigation
- Cybersecurity Compliance
- D
- Data Security
- DNS Spoofing
- Dynamic Analysis
- E
- Ethical Hacking
- Exploit
- F
- Firewall
- H
- HIPAA - Health Insurance Portability and Accountability Act of 1996
- I
- Improper Output Sanitization for Logs
- Insecure Direct Object Reference
- Issue Severity
- M
- Malicious code
- Malware
- Microservices
- Mitigation
- N
- National Vulnerability Database
- O
- Open Redirects
- Open Source Software
- P
- Patching
- Penetration Testing
- Phishing
- Q
- Quality Assurance
- Quality Control
- R
- Ransomware
- Rootkit
- S
- Secure Coding
- Security Operations Center (SOC)
- SIEM
- Social Engineering Attack
- Software as a Service (SaaS)
- Software Vulnerability
- Software Weakness
- Source Code Analysis
- Spyware
- Static Application Security Testing
- T
- Threat Intelligence
- Threat Modelling
- Trojan Horse
- V
- Viruses

Gartner and G2 recommends Appknox | See how Appknox can help you with a free Demo!
DISCOVER MORE
-
March 19, 2025
RASP vs. VAPT: Why You Need Both for Unbreakable Application Security
-
March 13, 2025
Top Checkmarx Alternatives for Application Security in 2025
-
February 28, 2025
Error Message Vulnerabilities: Why They Matter and How to Prevent Them
