SlideShare a Scribd company logo
TheSmartScanner.com
Security Acronyms
Glossary
Most Used Acronyms in Cyber Security Industry
TheSmartScanner.com
OWASP
 A nonprofit foundation that works to improve the security of software
 The OWASP Top 10 is one their popular projects.
Open Web Application Security Project
TheSmartScanner.com
XSS
 It stands for Cross-Site Scripting
 An X is used instead of the C to prevent confusion with Cascading Style Sheets
(CSS)
Cross Site Scripting
TheSmartScanner.com
SQLI
 An attack where the SQL commands used in an application are manipulated by
attacker
 SQLI is a dangerous and common vulnerability
SQL Injection
TheSmartScanner.com
RCE
 It can occur anywhere from routers to online shops.
 By exploiting RCE, an attacker can execute commands (usually OS commands)
on the target system
Remote Command Execution
TheSmartScanner.com
DoS
 A famous security acronym at the news
 DoS is a type of attack that makes the target service unavailable
 Attackers usually perform DoS attacks by sending enormous traffic to the
target
Denial of Service
TheSmartScanner.com
DDos
 A DoS attack from many different sources
 This type of DoS typically runs using zombie botnets
Distributed Denial of Service
TheSmartScanner.com
CSRF
 Pronounce Sea Surf
 AKA XSRF
 An attack where the attacker sends a request on behalf of a victim user
without her knowledge
 Attackers exploit CSRF to do actions using the victim's permission
 For example, a hacker can create an admin user for himself using a CSRF
attack
Cross-Site Request Forgery
TheSmartScanner.com
XXE
 A kind of attack against an application that parses XML input
 In this attack, the vulnerable application processes a reference to an external
entity in the provided XML
 The XXE is a dangerous attack that can lead to information disclosure or
denial of service attacks
XML External Entity
TheSmartScanner.com
SSRF
 An attack that the attacker can abuse functionality on the server to read or
update internal resources
Server-Side Request Forgery
TheSmartScanner.com
SSI
 A type of security attack that exploits the Service-side Includes features of a
web server
 The Server-side includes are tags in HTML files
 The web server executes these tags to add dynamic contents to the page
before sending it to the user
Server-Side Includes Injection
TheSmartScanner.com
RFI
 Occurs when the web application downloads and executes a remote file
 This remote file is usually controlled by an attacker and is passed as a request
parameter
Remote File Inclusion
TheSmartScanner.com
LFI
 Similar to a remote file inclusion vulnerability, but only local files on the
server can be included for execution
 It does not mean the LFI is less dangerous than RFI
Local File Inclusion
TheSmartScanner.com
LFD
 Similar to LFI
 The difference is that the local file is only opened and sent back to the user
 The contents of file is not executed
Local File Download or Disclosure
TheSmartScanner.com
IDOR
 It is a vulnerability that occurs when a reference to an internal object, such
as a file or directory, is retrieved from user-supplied input
 If no proper authorization is implemented, an attacker can abuse this
reference to access every object
Insecure Direct Object Reference
TheSmartScanner.com
CVE
 A system that provides a mechanism for referencing publicly known security
vulnerabilities
Common Vulnerabilities and Exposures
TheSmartScanner.com
CWE
 A category system for hardware and software weaknesses and vulnerabilities
Common Weakness Enumeration
TheSmartScanner.com
SmartScanner
Test your Web Application For Security Issues
https://www.TheSmartScanner.com
Thank You

More Related Content

Similar to Cyber Security Acronyms Glossary.pptx

Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Cybersecurity Education and Research Centre
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Ajith Kp
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
Zero Science Lab
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
Rubal Sagwal
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
krishh sivakrishna
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
HTS Hosting
 
OWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITISOWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITIS
Null Bhubaneswar
 
Browser Security ppt.pptx
Browser Security ppt.pptxBrowser Security ppt.pptx
Browser Security ppt.pptx
AjaySahre
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
Ajith Kp
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
Jay Nagar
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
Bhargav Modi
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
vhimsikal
 
Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
Secure Code Warrior
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
Jennifer Campbell
 
Web services
Web servicesWeb services
Web services
Vinay Kumar
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
RRamyaDevi
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
Aravindharamanan S
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
Chris Hillman
 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
Reza Nurfachmi
 

Similar to Cyber Security Acronyms Glossary.pptx (20)

Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
Web Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The WebWeb Vulnerabilities And Exploitation - Compromising The Web
Web Vulnerabilities And Exploitation - Compromising The Web
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
The Nitty Gritty of Website Security
The Nitty Gritty of Website SecurityThe Nitty Gritty of Website Security
The Nitty Gritty of Website Security
 
OWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITISOWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITIS
 
Browser Security ppt.pptx
Browser Security ppt.pptxBrowser Security ppt.pptx
Browser Security ppt.pptx
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
 
Are you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weaponsAre you fighting_new_threats_with_old_weapons
Are you fighting_new_threats_with_old_weapons
 
Web application sec_3
Web application sec_3Web application sec_3
Web application sec_3
 
Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
 
Factors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent InvolvedFactors Affecting The Threat Agent Involved
Factors Affecting The Threat Agent Involved
 
Web services
Web servicesWeb services
Web services
 
cryptography .pptx
cryptography .pptxcryptography .pptx
cryptography .pptx
 
Owasp top 10
Owasp top 10Owasp top 10
Owasp top 10
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Hack using firefox
Hack using firefoxHack using firefox
Hack using firefox
 

Recently uploaded

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 

Recently uploaded (12)

一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 

Cyber Security Acronyms Glossary.pptx

  • 1. TheSmartScanner.com Security Acronyms Glossary Most Used Acronyms in Cyber Security Industry
  • 2. TheSmartScanner.com OWASP  A nonprofit foundation that works to improve the security of software  The OWASP Top 10 is one their popular projects. Open Web Application Security Project
  • 3. TheSmartScanner.com XSS  It stands for Cross-Site Scripting  An X is used instead of the C to prevent confusion with Cascading Style Sheets (CSS) Cross Site Scripting
  • 4. TheSmartScanner.com SQLI  An attack where the SQL commands used in an application are manipulated by attacker  SQLI is a dangerous and common vulnerability SQL Injection
  • 5. TheSmartScanner.com RCE  It can occur anywhere from routers to online shops.  By exploiting RCE, an attacker can execute commands (usually OS commands) on the target system Remote Command Execution
  • 6. TheSmartScanner.com DoS  A famous security acronym at the news  DoS is a type of attack that makes the target service unavailable  Attackers usually perform DoS attacks by sending enormous traffic to the target Denial of Service
  • 7. TheSmartScanner.com DDos  A DoS attack from many different sources  This type of DoS typically runs using zombie botnets Distributed Denial of Service
  • 8. TheSmartScanner.com CSRF  Pronounce Sea Surf  AKA XSRF  An attack where the attacker sends a request on behalf of a victim user without her knowledge  Attackers exploit CSRF to do actions using the victim's permission  For example, a hacker can create an admin user for himself using a CSRF attack Cross-Site Request Forgery
  • 9. TheSmartScanner.com XXE  A kind of attack against an application that parses XML input  In this attack, the vulnerable application processes a reference to an external entity in the provided XML  The XXE is a dangerous attack that can lead to information disclosure or denial of service attacks XML External Entity
  • 10. TheSmartScanner.com SSRF  An attack that the attacker can abuse functionality on the server to read or update internal resources Server-Side Request Forgery
  • 11. TheSmartScanner.com SSI  A type of security attack that exploits the Service-side Includes features of a web server  The Server-side includes are tags in HTML files  The web server executes these tags to add dynamic contents to the page before sending it to the user Server-Side Includes Injection
  • 12. TheSmartScanner.com RFI  Occurs when the web application downloads and executes a remote file  This remote file is usually controlled by an attacker and is passed as a request parameter Remote File Inclusion
  • 13. TheSmartScanner.com LFI  Similar to a remote file inclusion vulnerability, but only local files on the server can be included for execution  It does not mean the LFI is less dangerous than RFI Local File Inclusion
  • 14. TheSmartScanner.com LFD  Similar to LFI  The difference is that the local file is only opened and sent back to the user  The contents of file is not executed Local File Download or Disclosure
  • 15. TheSmartScanner.com IDOR  It is a vulnerability that occurs when a reference to an internal object, such as a file or directory, is retrieved from user-supplied input  If no proper authorization is implemented, an attacker can abuse this reference to access every object Insecure Direct Object Reference
  • 16. TheSmartScanner.com CVE  A system that provides a mechanism for referencing publicly known security vulnerabilities Common Vulnerabilities and Exposures
  • 17. TheSmartScanner.com CWE  A category system for hardware and software weaknesses and vulnerabilities Common Weakness Enumeration
  • 18. TheSmartScanner.com SmartScanner Test your Web Application For Security Issues https://www.TheSmartScanner.com Thank You