Skip to content

Security

138 terms in this category

2FA (2FA)

2FA is short for Two-Factor Authentication. Two locks instead of one. Password plus a code from your phone (or a hardware key).

beginnerSecurity

AI Red Teaming

AI red teaming is probing AI systems for failures, jailbreaks, and safety bypasses before deployment — break it so users can't.

advancedSecurity

API Key Rotation

API Key Rotation is regularly replacing your API keys with new ones. Like changing passwords, but for machine-to-machine authentication.

intermediateSecurity

API Security

API security is protecting your APIs from abuse, data leaks, and unauthorized access. It covers authentication (who are you?), authorization (can you do th

intermediateSecurity

Access Token

An Access Token is your short-lived pass to access an API. It proves you're authenticated and what you're allowed to do.

beginnerSecurity

Asymmetric Encryption

Asymmetric encryption uses two different keys — one to lock (public key), one to unlock (private key).

intermediateSecurity

Auth0

Auth0 is the auth service that enterprise companies pay for because it has compliance checkboxes, SAML, and an SLA.

intermediateSecurity

Authentication (AuthN)

Authentication is proving you are who you say you are.

beginnerSecurity

Authorization (AuthZ)

Authorization is deciding what you're allowed to do after you've proven who you are.

beginnerSecurity

Bcrypt

Bcrypt is the gold-standard password hasher that's intentionally slow.

intermediateSecurity

Biometric

Biometric authentication uses your body as your password — fingerprint, face, iris scan.

beginnerSecurity

Bot Detection

Bot Detection figures out if a visitor is a human or a robot. Good bots (Googlebot) are welcome. Bad bots (scrapers, credential stuffers) get blocked.

intermediateSecurity

Brute Force

Brute force is the dumbest but sometimes effective hacking technique — just try every possible password until one works. No creativity needed.

beginnerSecurity

Bug Bounty

A bug bounty program pays ethical hackers to find security vulnerabilities in your product.

beginnerSecurity

CAPTCHA

CAPTCHA is that annoying 'select all traffic lights' test that proves you're human.

beginnerSecurity

CORS (CORS)

CORS (Cross-Origin Resource Sharing) is the browser's built-in protection that prevents random websites from making API calls to your backend using the vis...

intermediateSecurity

CSP (CSP)

CSP stands for Content Security Policy.

intermediateSecurity

CSRF (CSRF)

CSRF (Cross-Site Request Forgery) is when a bad website hijacks your logged-in session on a good website to do things you didn't ask for.

intermediateSecurity

Certificate

A certificate is a digital ID card for a website, signed by a trusted authority.

intermediateSecurity

Certificate Authority (CA)

A Certificate Authority is like the DMV of the internet — a trusted organization that vouches for websites' identities.

intermediateSecurity

Certificate Pinning

Certificate Pinning means your app only trusts a SPECIFIC certificate, not any cert signed by a trusted CA.

advancedSecurity

Clerk

Clerk is auth for developers who hate building auth UI.

beginnerSecurity

Command Injection

Command injection is like SQL injection but worse — instead of attacking your database, the hacker injects shell commands that run on your actual server.

intermediateSecurity

Compliance

Compliance means following the rules — legal, industry, or governmental standards that say how you must handle data and security.

beginnerSecurity

Container Scanning

Container Scanning checks your Docker images for known vulnerabilities in OS packages, libraries, and misconfigurations.

intermediateSecurity

Content Security Policy (CSP)

Content Security Policy is an HTTP header that tells the browser exactly where it's allowed to load scripts, images, and other resources from.

intermediateSecurity

Content Security Policy Headers

CSP tells the browser exactly where scripts, styles, images, and other resources are allowed to load from. If a hacker injects a script pointing to evil.

intermediateSecurity

Cosign

Cosign is the tool for signing container images, SBOMs, and other artifacts. It's part of the Sigstore project and makes image signing as easy as 'cosign s

advancedSecurity

Credential Rotation

Credential Rotation is the practice of regularly changing ALL your secrets — database passwords, API keys, certificates, tokens.

intermediateSecurity

Cross-Site Request Forgery (CSRF)

CSRF tricks your browser into making requests to another site while you're logged in.

intermediateSecurity

Cross-Site Scripting (XSS)

XSS is when a hacker sneaks their own JavaScript into your website so it runs in other people's browsers.

intermediateSecurity

DAST

DAST attacks your running application to find vulnerabilities — like hiring a friendly hacker to poke at your website.

intermediateSecurity

DDoS (DDoS)

DDoS (Distributed Denial of Service) is when thousands of computers flood your server with so much fake traffic that it can't handle real users.

beginnerSecurity

DDoS Mitigation

DDoS Mitigation protects your site from being overwhelmed by millions of fake requests.

intermediateSecurity

Decryption

Decryption is using the secret decoder ring to turn scrambled gibberish back into a readable message.

beginnerSecurity

Defense in Depth

Defense in Depth means layering multiple security measures so if one fails, others catch the threat.

beginnerSecurity

Dependency Confusion

Dependency Confusion tricks package managers into downloading a malicious public package instead of your private one.

advancedSecurity

DevSecOps

DevSecOps is the philosophy that security isn't something you bolt on at the end — it's baked into every step of development.

intermediateSecurity

Device Flow

Device Flow is OAuth for devices without a browser or keyboard — smart TVs, CLI tools, IoT devices. The device shows you a code, you go to a URL on your ph

advancedSecurity

Encoding

Encoding is converting data into a different format for safe transport or storage — not for security, but to prevent misinterpretation.

beginnerSecurity

Encryption

Encryption is scrambling your message into gibberish so only someone with the secret decoder ring can read it.

beginnerSecurity

Envelope Encryption

Envelope Encryption is a two-key system: you encrypt your data with a 'data key,' then encrypt that data key with a 'master key.

advancedSecurity

Escape

Escaping means converting special characters into their safe equivalents before putting them in HTML, SQL, or a shell command.

beginnerSecurity

Exploit

An exploit is the actual tool or technique used to take advantage of a vulnerability.

beginnerSecurity

FIDO2

FIDO2 is the whole framework that makes passwordless authentication work — WebAuthn (browser side) plus CTAP (authenticator side).

advancedSecurity

Falco

Falco is a runtime security tool that watches system calls in your Kubernetes cluster.

advancedSecurity

Feature Policy

Feature Policy (now Permissions Policy) controls which browser features your site and embedded iframes can use. Block camera access? Disable geolocation?

intermediateSecurity

Firebase Auth

Firebase Auth is Google's 'just add authentication' service. Email/password, Google login, Apple sign-in, phone verification — it handles all of it so you

beginnerSecurity

Firestore Rules

Firestore Rules are like a very picky nightclub bouncer who checks not just your ID, but also whether you're on the guest list, wearing the right shoes, an

intermediateSecurity

Fork Bomb

A fork bomb is a program that endlessly copies itself until it eats all system resources and crashes the machine.

intermediateSecurity

GDPR (GDPR)

GDPR (General Data Protection Regulation) is the EU's big rulebook for protecting people's personal data.

beginnerSecurity

HSM (Hardware Security Module)

HSM stands for Hardware Security Module — a tamper-proof physical device that manages cryptographic keys. If someone tries to open it, the keys self-destru

advancedSecurity

HSTS (HSTS)

HSTS (HTTP Strict Transport Security) tells the browser 'this site is ALWAYS HTTPS, never even try HTTP.

intermediateSecurity

Hardware Security Module

An HSM is a physical device that generates, stores, and uses cryptographic keys without ever exposing them.

advancedSecurity

HashiCorp Vault

HashiCorp Vault is a fortress for your secrets.

advancedSecurity

Hashing

Hashing is a one-way blender for data. You throw a password in, it spits out a weird string of letters and numbers, and there's no way to reverse it.

beginnerSecurity

Homomorphic Encryption

Homomorphic Encryption lets you do math on encrypted data WITHOUT decrypting it.

advancedSecurity

Image Signing

Image Signing is like putting a wax seal on your Docker images.

advancedSecurity

Input Validation

Input validation is checking that user input is what you expect before using it.

beginnerSecurity

JWT Security

JWT Security is about not screwing up JSON Web Tokens.

intermediateSecurity

KMS (Key Management Service)

KMS is the cloud service that holds your encryption keys in a hardware vault and does crypto operations for you. Need to encrypt something? Send it to KMS.

intermediateSecurity

Key Management Service

A Key Management Service (KMS) manages your encryption keys so you don't have to.

advancedSecurity

Lucia Auth

Lucia Auth is the 'I want to understand my auth' library.

intermediateSecurity

MD5 (MD5)

MD5 is the old grandpa hash algorithm — fast, but full of holes.

beginnerSecurity

MFA (MFA)

MFA stands for Multi-Factor Authentication. It's the umbrella term for requiring multiple proofs of identity. 2FA is MFA with exactly two factors.

beginnerSecurity

MITM (MITM)

MITM stands for Man-in-the-Middle. An attacker silently sits between your browser and the server, eavesdropping on everything.

intermediateSecurity

Magic Link

A login method where they email you a special link instead of asking for a password. Click the link, you're in.

beginnerSecurity

Man-in-the-Middle (MITM)

A man-in-the-middle attack is when a hacker secretly sits between you and the website you're talking to, reading and possibly changing everything you send...

intermediateSecurity

Microsegmentation

Microsegmentation is network segmentation dialed up to 11. Instead of segmenting by subnet, you create rules for EVERY workload.

advancedSecurity

Model Inversion

Model inversion is reconstructing training data from a trained ML model — the privacy attack that makes ML teams sweat.

advancedSecurity

Multi-Factor Authentication (MFA)

MFA is like 2FA but can use more than two factors. Three locks instead of two.

beginnerSecurity

Network Segmentation

Network Segmentation divides your network into isolated zones. The web servers can't talk to the database directly.

intermediateSecurity

NextAuth

NextAuth is the 'build your own auth but with guardrails' option.

intermediateSecurity

OAuth Scopes

OAuth Scopes define what an app is allowed to do with your account. 'Read your email' is a scope. 'Send email on your behalf' is another.

intermediateSecurity

OAuth2 Proxy

OAuth2 Proxy sits in front of your app and says 'not logged in? go authenticate first.

advancedSecurity

OWASP (OWASP)

OWASP (Open Web Application Security Project) is the internet's biggest security club.

beginnerSecurity

OWASP API Top 10

The OWASP API Top 10 is a cheat sheet of the most common ways APIs get hacked.

intermediateSecurity

OWASP Top 10

The OWASP Top 10 is the security industry's greatest hits of web vulnerabilities — the 10 most common, dangerous ways apps get hacked.

beginnerSecurity

PCI DSS (PCI DSS)

PCI DSS is the security standard you must follow if you handle credit card data.

intermediateSecurity

PKCE

PKCE (pronounced 'pixy') prevents someone from stealing your OAuth authorization code and using it.

advancedSecurity

Passkey

Passkeys replace passwords with biometrics (fingerprint, face) or device PINs. No more 'Forgot password?

intermediateSecurity

Passkeys

Passkeys replace passwords with your fingerprint, face, or device PIN. No more remembering 'P@ssw0rd123!' — your phone or laptop IS your password.

intermediateSecurity

Passport.js

Passport.js is the oldest auth library still standing in Node.js.

intermediateSecurity

Password Manager

A password manager remembers all your passwords so you don't have to reuse the same one everywhere.

beginnerSecurity

Penetration Testing

Penetration testing (pentesting) is hiring ethical hackers to try to break into your own systems before the real bad guys do.

intermediateSecurity

Pentest

Pentest is just short for penetration testing — the art of ethically hacking your own systems to find weaknesses.

intermediateSecurity

Permissions Policy

Permissions Policy is Feature Policy's newer, better version. Same concept — control which browser features your site can use.

intermediateSecurity

Phishing

Phishing is when hackers pretend to be someone you trust — your bank, your boss, Google — to trick you into giving up your password or clicking a bad link.

beginnerSecurity

Principle of Least Privilege

Principle of Least Privilege means everyone and everything gets only the MINIMUM access needed to do their job. The intern doesn't get admin access.

beginnerSecurity

Private Key

A private key is the secret key that only YOU keep. It can decrypt messages encrypted with your public key, or sign messages to prove they came from you.

intermediateSecurity

Prompt Exfiltration

Prompt exfiltration is attacking an AI to leak its system prompt — not hijacking the model's behavior, but stealing its instructions.

advancedSecurity

Public Key

A public key is like your open mailbox — anyone can drop a message in it (encrypt data with it), but only you have the key to open the box and read it (you...

intermediateSecurity

Rate Limiting Security

Rate Limiting prevents abuse by capping how many requests someone can make. 100 login attempts per minute? Blocked. 1000 API calls per second? Throttled.

intermediateSecurity

Refresh Token

A Refresh Token is a long-lived secret that gets you new access tokens without re-logging in.

intermediateSecurity

Runtime Security

Runtime Security monitors your applications WHILE they're running.

advancedSecurity

SAST

SAST scans your source code for security bugs WITHOUT running it.

intermediateSecurity

SBOM (SBOM)

An SBOM (Software Bill of Materials) is a complete ingredient list for your software — every library, framework, and dependency with their exact versions.

intermediateSecurity

SCA

SCA checks if the libraries you're using have known vulnerabilities. You didn't write the bug, but you imported it. That lodash version from 2019?

intermediateSecurity

SHA (SHA)

SHA (Secure Hash Algorithm) is a family of blenders for data.

intermediateSecurity

SLSA

SLSA (pronounced 'salsa') is a framework with levels (1-4) that measure how secure your software supply chain is. Level 1: you have some build process.

advancedSecurity

SOC 2 (SOC 2)

SOC 2 is a trust certification for SaaS companies. It proves to enterprise customers that you take security, availability, and privacy seriously.

intermediateSecurity

SQL Injection

SQL injection is when a hacker types SQL code into a text field instead of normal text, and your stupid database runs it.

intermediateSecurity

SSL (SSL)

SSL (Secure Sockets Layer) is the old-school version of the lock you see in your browser address bar.

beginnerSecurity

SSO (Single Sign-On)

Log in once, access everything. Instead of remembering 47 different passwords for 47 different work apps, you log in to one system (like Google or Okta) an...

intermediateSecurity

Salt

A salt is random gibberish you add to a password before hashing it so two people with the same password get completely different hashes.

intermediateSecurity

Sanitization

Sanitization is cleaning up user input before using it — stripping out anything dangerous like script tags or SQL commands.

beginnerSecurity

Secret Scanning

Secret Scanning checks your code for accidentally committed passwords, API keys, and tokens. Pushed your AWS key to GitHub?

beginnerSecurity

Secure Boot

Secure Boot verifies that every piece of software that loads during startup is signed and trusted. Bootloader? Signed. Kernel? Signed. Drivers? Signed. If

advancedSecurity

Secure Enclave

A Secure Enclave is a tiny, isolated computer inside your computer that handles the most sensitive stuff — biometric data, encryption keys, payment info.

advancedSecurity

Security Audit

A security audit is a systematic review of your code, infrastructure, and processes to find security weaknesses.

beginnerSecurity

Security Headers

Security Headers are HTTP response headers that tell browsers 'here's how to protect my users.

intermediateSecurity

Security Theater

Security theater is the stuff that looks secure but doesn't actually stop attackers.

intermediateSecurity

Session Hijacking

Session hijacking is when an attacker steals your session cookie or token and impersonates you.

intermediateSecurity

Sigstore

Sigstore makes signing software as easy as logging in with your Google account. No managing PGP keys, no key rotation headaches.

advancedSecurity

Social Engineering

Social engineering is hacking people, not computers.

beginnerSecurity

Software Composition Analysis

Software Composition Analysis is a fancy name for 'checking your dependencies for known vulnerabilities and license issues.

intermediateSecurity

Subresource Integrity

Subresource Integrity (SRI) adds a hash to your script and link tags. The browser downloads the file, checks the hash, and only executes it if it matches.

intermediateSecurity

Supply Chain Attack

A supply chain attack is when a hacker doesn't attack YOU — they attack something you depend on.

advancedSecurity

Supply Chain Security

Supply Chain Security protects the entire path from code to production — dependencies, build systems, registries, everything.

intermediateSecurity

Symmetric Encryption

Symmetric encryption uses the same key to lock and unlock data. Like a house key — whoever has a copy can both lock and unlock the door.

intermediateSecurity

TLS (TLS)

TLS (Transport Layer Security) is the updated, actually-secure version of SSL. It's the technology that puts the padlock in your browser's address bar.

intermediateSecurity

TOTP (TOTP)

TOTP (Time-based One-Time Password) is the 6-digit code that changes every 30 seconds in apps like Google Authenticator.

intermediateSecurity

TPM (Trusted Platform Module)

TPM is the security chip on your computer's motherboard that stores encryption keys and verifies boot integrity. It's why Windows 11 requires TPM 2.0 — Mic

advancedSecurity

Token Rotation

Token Rotation means regularly replacing your tokens with fresh ones. Old token out, new token in.

intermediateSecurity

Trusted Platform Module (TPM)

A TPM is a security chip on your motherboard that stores encryption keys, certificates, and passwords in tamper-resistant hardware. It verifies that your c

advancedSecurity

Two-Factor Authentication (2FA)

2FA means you need two things to log in: something you know (password) and something you have (your phone).

beginnerSecurity

Typosquatting

Typosquatting is when attackers publish malicious packages with names that are one typo away from popular ones. 'lodahs' instead of 'lodash.

intermediateSecurity

Vault

HashiCorp Vault is the Fort Knox of secrets management. It stores API keys, passwords, certificates, and encryption keys behind multiple layers of security

intermediateSecurity

Vulnerability

A vulnerability is a weakness in your code or system that a bad guy could exploit. Like a broken lock on a door.

beginnerSecurity

WAF (WAF)

WAF stands for Web Application Firewall.

intermediateSecurity

Web Application Firewall (WAF)

A WAF is a smart firewall that understands web traffic.

intermediateSecurity

WebAuthn

WebAuthn is the browser API that makes passkeys work.

advancedSecurity

Webhook Signature

A webhook signature is like the wax seal on a medieval letter — it proves the message actually came from who it says it came from and wasn't tampered with.

intermediateSecurity

XSS (XSS)

XSS stands for Cross-Site Scripting. Hackers inject their own JavaScript into your site so when other users visit, the evil script runs in their browser.

intermediateSecurity

Zero Trust

Zero trust means 'never trust, always verify' — even if a request comes from inside your network.

intermediateSecurity

Zero-Day

A zero-day is a vulnerability that nobody knows about yet — except the person who found it. The name means the vendor has had 'zero days' to fix it.

intermediateSecurity

Zero-Knowledge Proof

A Zero-Knowledge Proof lets you prove you know something without revealing what you know. Prove you're over 18 without showing your birthday.

advancedSecurity

mTLS

Normal TLS: you check that the website is legit. mTLS: you BOTH check each other. The server verifies your certificate, you verify the server's.

advancedSecurity

Made with passive-aggressive love by manoga.digital. Powered by Claude.