SlideShare a Scribd company logo
1 of 18
TheSmartScanner.com
Security Acronyms
Glossary
Most Used Acronyms in Cyber Security Industry
TheSmartScanner.com
OWASP
 A nonprofit foundation that works to improve the security of software
 The OWASP Top 10 is one their popular projects.
Open Web Application Security Project
TheSmartScanner.com
XSS
 It stands for Cross-Site Scripting
 An X is used instead of the C to prevent confusion with Cascading Style Sheets
(CSS)
Cross Site Scripting
TheSmartScanner.com
SQLI
 An attack where the SQL commands used in an application are manipulated by
attacker
 SQLI is a dangerous and common vulnerability
SQL Injection
TheSmartScanner.com
RCE
 It can occur anywhere from routers to online shops.
 By exploiting RCE, an attacker can execute commands (usually OS commands)
on the target system
Remote Command Execution
TheSmartScanner.com
DoS
 A famous security acronym at the news
 DoS is a type of attack that makes the target service unavailable
 Attackers usually perform DoS attacks by sending enormous traffic to the
target
Denial of Service
TheSmartScanner.com
DDos
 A DoS attack from many different sources
 This type of DoS typically runs using zombie botnets
Distributed Denial of Service
TheSmartScanner.com
CSRF
 Pronounce Sea Surf
 AKA XSRF
 An attack where the attacker sends a request on behalf of a victim user
without her knowledge
 Attackers exploit CSRF to do actions using the victim's permission
 For example, a hacker can create an admin user for himself using a CSRF
attack
Cross-Site Request Forgery
TheSmartScanner.com
XXE
 A kind of attack against an application that parses XML input
 In this attack, the vulnerable application processes a reference to an external
entity in the provided XML
 The XXE is a dangerous attack that can lead to information disclosure or
denial of service attacks
XML External Entity
TheSmartScanner.com
SSRF
 An attack that the attacker can abuse functionality on the server to read or
update internal resources
Server-Side Request Forgery
TheSmartScanner.com
SSI
 A type of security attack that exploits the Service-side Includes features of a
web server
 The Server-side includes are tags in HTML files
 The web server executes these tags to add dynamic contents to the page
before sending it to the user
Server-Side Includes Injection
TheSmartScanner.com
RFI
 Occurs when the web application downloads and executes a remote file
 This remote file is usually controlled by an attacker and is passed as a request
parameter
Remote File Inclusion
TheSmartScanner.com
LFI
 Similar to a remote file inclusion vulnerability, but only local files on the
server can be included for execution
 It does not mean the LFI is less dangerous than RFI
Local File Inclusion
TheSmartScanner.com
LFD
 Similar to LFI
 The difference is that the local file is only opened and sent back to the user
 The contents of file is not executed
Local File Download or Disclosure
TheSmartScanner.com
IDOR
 It is a vulnerability that occurs when a reference to an internal object, such
as a file or directory, is retrieved from user-supplied input
 If no proper authorization is implemented, an attacker can abuse this
reference to access every object
Insecure Direct Object Reference
TheSmartScanner.com
CVE
 A system that provides a mechanism for referencing publicly known security
vulnerabilities
Common Vulnerabilities and Exposures
TheSmartScanner.com
CWE
 A category system for hardware and software weaknesses and vulnerabilities
Common Weakness Enumeration
TheSmartScanner.com
SmartScanner
Test your Web Application For Security Issues
https://www.TheSmartScanner.com
Thank You

More Related Content

Similar to Cyber Security Acronyms Glossary.pptx

Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
Jennifer Campbell
 

Similar to Cyber Security Acronyms Glossary.pptx (20)

Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
 
OWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITISOWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITIS
 
Browser Security ppt.pptx
Browser Security ppt.pptxBrowser Security ppt.pptx
Browser Security ppt.pptx
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
 
Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
Web services
Web servicesWeb services
Web services
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
 

Recently uploaded

Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
ChloeMeadows1
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 

Recently uploaded (16)

Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Topology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdfTopology of the Network class 8 .ppt pdf
Topology of the Network class 8 .ppt pdf
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 

Cyber Security Acronyms Glossary.pptx

  • 1. TheSmartScanner.com Security Acronyms Glossary Most Used Acronyms in Cyber Security Industry
  • 2. TheSmartScanner.com OWASP  A nonprofit foundation that works to improve the security of software  The OWASP Top 10 is one their popular projects. Open Web Application Security Project
  • 3. TheSmartScanner.com XSS  It stands for Cross-Site Scripting  An X is used instead of the C to prevent confusion with Cascading Style Sheets (CSS) Cross Site Scripting
  • 4. TheSmartScanner.com SQLI  An attack where the SQL commands used in an application are manipulated by attacker  SQLI is a dangerous and common vulnerability SQL Injection
  • 5. TheSmartScanner.com RCE  It can occur anywhere from routers to online shops.  By exploiting RCE, an attacker can execute commands (usually OS commands) on the target system Remote Command Execution
  • 6. TheSmartScanner.com DoS  A famous security acronym at the news  DoS is a type of attack that makes the target service unavailable  Attackers usually perform DoS attacks by sending enormous traffic to the target Denial of Service
  • 7. TheSmartScanner.com DDos  A DoS attack from many different sources  This type of DoS typically runs using zombie botnets Distributed Denial of Service
  • 8. TheSmartScanner.com CSRF  Pronounce Sea Surf  AKA XSRF  An attack where the attacker sends a request on behalf of a victim user without her knowledge  Attackers exploit CSRF to do actions using the victim's permission  For example, a hacker can create an admin user for himself using a CSRF attack Cross-Site Request Forgery
  • 9. TheSmartScanner.com XXE  A kind of attack against an application that parses XML input  In this attack, the vulnerable application processes a reference to an external entity in the provided XML  The XXE is a dangerous attack that can lead to information disclosure or denial of service attacks XML External Entity
  • 10. TheSmartScanner.com SSRF  An attack that the attacker can abuse functionality on the server to read or update internal resources Server-Side Request Forgery
  • 11. TheSmartScanner.com SSI  A type of security attack that exploits the Service-side Includes features of a web server  The Server-side includes are tags in HTML files  The web server executes these tags to add dynamic contents to the page before sending it to the user Server-Side Includes Injection
  • 12. TheSmartScanner.com RFI  Occurs when the web application downloads and executes a remote file  This remote file is usually controlled by an attacker and is passed as a request parameter Remote File Inclusion
  • 13. TheSmartScanner.com LFI  Similar to a remote file inclusion vulnerability, but only local files on the server can be included for execution  It does not mean the LFI is less dangerous than RFI Local File Inclusion
  • 14. TheSmartScanner.com LFD  Similar to LFI  The difference is that the local file is only opened and sent back to the user  The contents of file is not executed Local File Download or Disclosure
  • 15. TheSmartScanner.com IDOR  It is a vulnerability that occurs when a reference to an internal object, such as a file or directory, is retrieved from user-supplied input  If no proper authorization is implemented, an attacker can abuse this reference to access every object Insecure Direct Object Reference
  • 16. TheSmartScanner.com CVE  A system that provides a mechanism for referencing publicly known security vulnerabilities Common Vulnerabilities and Exposures
  • 17. TheSmartScanner.com CWE  A category system for hardware and software weaknesses and vulnerabilities Common Weakness Enumeration
  • 18. TheSmartScanner.com SmartScanner Test your Web Application For Security Issues https://www.TheSmartScanner.com Thank You