Knowledge Base

Cybersecurity Glossary

Comprehensive definitions of key cybersecurity terms, concepts, and techniques used by security professionals.

AllCryptographyDefenseHuman SecurityIntelligenceMalwareOffensive SecurityStandardsVulnerabilitiesWeb Security

API Security

Web Security

Practices and tools to protect Application Programming Interfaces from attacks and misuse.

Bug Bounty Program

Offensive Security

A program where organizations reward security researchers for finding and reporting vulnerabilities.

Cross-Site Request Forgery (CSRF)

Web Security

An attack that forces authenticated users to submit unwanted requests to a web application.

Cross-Site Scripting (XSS)

Web Security

A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

Dark Web

Intelligence

Part of the internet only accessible through special software like Tor, often used for anonymous communication.

Encryption

Cryptography

The process of converting data into a coded format to prevent unauthorized access.

Exploit

Offensive Security

A piece of software or technique that takes advantage of a vulnerability to cause unintended behavior.

Incident Response

Defense

The organized approach to addressing and managing the aftermath of a security breach.

Open Source Intelligence (OSINT)

Intelligence

Intelligence collected from publicly available sources for security research and investigations.

OWASP Top 10

Standards

A standard awareness document listing the top 10 most critical web application security risks.

Penetration Testing (Pentesting)

Offensive Security

Authorized simulated cyberattack on a computer system to evaluate its security.

Phishing

Human Security

A cyberattack that uses disguised emails or websites to steal sensitive information.

Ransomware

Malware

Malware that encrypts files and demands payment for the decryption key.

Red Team

Offensive Security

A group that simulates real-world attacks to test an organization's security defenses.

Social Engineering

Human Security

Psychological manipulation techniques used to trick people into revealing confidential information.

SQL Injection (SQLi)

Web Security

A code injection technique that exploits security vulnerabilities in database queries.

Threat Intelligence

Intelligence

Evidence-based knowledge about existing or emerging threats to inform security decisions.

Vulnerability Assessment

Defense

A systematic process of identifying, quantifying, and prioritizing security vulnerabilities.

Web Application Firewall (WAF)

Defense

A security system that monitors and filters HTTP traffic to protect web applications.

Zero-Day Vulnerability

Vulnerabilities

A software vulnerability unknown to the vendor with no available patch.

Put Your Knowledge Into Practice

Use mr7.ai's AI-powered security tools to apply these concepts. Get 10,000 free tokens to start.

We value your privacy

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Learn more