Glossary: Difference between revisions
From SecurityTools
Adding a few more terms, setup internal page links for future definitions. Considering changing to single-page term/definition already... |
Re-arrange terms, remove internal-page links, place definitions on page |
||
| Line 1: | Line 1: | ||
* | * Blue Team - Security team members who emphasize defensive security practices | ||
* | *Buffer Overflow - An attack on an application where more data is sent than the program is prepared to accept, resulting in unexpected application behavior | ||
* | * Cross-Site Scripting (XSS) - A web-based attack in which unsanitized inputs to the server results in unexpected behavior by the web client | ||
* | * Digital Forensics - The method of examining digital media for evidence of malfeasance | ||
* | *Fuzzing | ||
* | * Incident Response - The response to attacks or malware by the security team | ||
* | * OSInt (Open-Source Intelligence) - The use of freely available resources to gather information about a target | ||
*[[ | *Packet Capture - The gathering of network traffic for analysis by a [[network protocol analyzer]] | ||
* | *Penetration Testing | ||
* | * Purple Team | ||
* | * Red Team - Security team members who emphasize offensive security practices such as penetration testing | ||
* | *SQL Injection | ||
Revision as of 04:13, 9 November 2021
- Blue Team - Security team members who emphasize defensive security practices
- Buffer Overflow - An attack on an application where more data is sent than the program is prepared to accept, resulting in unexpected application behavior
- Cross-Site Scripting (XSS) - A web-based attack in which unsanitized inputs to the server results in unexpected behavior by the web client
- Digital Forensics - The method of examining digital media for evidence of malfeasance
- Fuzzing
- Incident Response - The response to attacks or malware by the security team
- OSInt (Open-Source Intelligence) - The use of freely available resources to gather information about a target
- Packet Capture - The gathering of network traffic for analysis by a network protocol analyzer
- Penetration Testing
- Purple Team
- Red Team - Security team members who emphasize offensive security practices such as penetration testing
- SQL Injection
