Software Security Glossary

Important definitions and terminologies used in Software Security

ABCDEFGHIJKLMNOPRSTUVWZOthers

A

Access Control in Software Security

ActiveX in Software Security

Agile or Extreme development model in Software Security

Android Security in Software Security

Application Security in Software Security

ASP.NET Web Application Security in Software Security

Asset in Software Security

Attack Vector in Software Security

Audit Trail in Software Security

Authentication in Software Security

Authentication Attacks in Software Security

Authentication Controls in Software Security

Authorization in Software Security

Availability in Software Security

Go to Top

B

Backdoor in Software Security

Big Data Security in Software Security

Biometric Authentication in Software Security

Botnet in Software Security

Buffer Overflow in Software Security

Go to Top

C

C/C++ Dynamic Memory Management in Software Security

C/C++ Exception Handling in Software Security

C/C++ Formatted Functions in Software Security

C/C++ Integer Overflow in Software Security

C/C++ Pointers in Software Security

C/C++ String Issues in Software Security

Certificate Authority in Software Security

Cloud Computing in Software Security

Cloud Security in Software Security

Code Injection in Software Security

Command Injection in Software Security

Common Vulnerabilities and Exposures (CVE) in Software Security

Compliance in Software Security

Computer Emergency Response Team (CERT) in Software Security

Computer Security in Software Security

Confidentiality in Software Security

Cross-Site Request Forgery (CSRF) in Software Security

Cross-Site Scripting (XSS) in Software Security

Cryptography in Software Security

Go to Top

D

Data Breach in Software Security

Defense in Depth in Software Security

Denial of Service (DoS) in Software Security

Digital Asset in Software Security

Digital Signature in Software Security

Go to Top

E

Encryption in Software Security

Endpoint Security in Software Security

Exploit in Software Security

Go to Top

F

File Integrity Monitoring in Software Security

Firewall in Software Security

Format String Attack in Software Security

Go to Top

G

Globbing Hacks in Software Security

Go to Top

H

Hacking in Software Security

Hash Function in Software Security

Heap Corruption in Software Security

Go to Top

I

Incident Response in Software Security

Input Validation in Software Security

Integer Overflows in Software Security

Integrity in Software Security

iOS Security in Software Security

IoT Security in Software Security

Go to Top

J

Java Access Control in Software Security

Java Permissions and Security Policy in Software Security

Java RMI in Software Security

Java Secure Class Loading in Software Security

Java Security in Software Security

Go to Top

K

Kerberos in Software Security

Go to Top

L

Least Privilege in Software Security

Log Management in Software Security

Go to Top

M

Malware in Software Security

Memory Corruption in Software Security

Message Authentication in Software Security

Mobile Security in Software Security

Multi-Factor Authentication in Software Security

Go to Top

N

Network Attacks in Software Security

Network Security in Software Security

Networking in Software Security

Go to Top

O

Open Web Application Security Project (OWASP) in Software Security

Go to Top

P

Password Policy in Software Security

Patch Management in Software Security

Penetration Test Report in Software Security

Penetration Testing in Software Security

Permission in Software Security

Phishing in Software Security

Physical Security in Software Security

Privacy in Software Security

Private and Public Key Exchange in Software Security

Programming Attacks in Software Security

Public Key Infrastructure in Software Security

Go to Top

R

Remote Code Execution in Software Security

Risk Assessment in Software Security

Risk Management in Software Security

Go to Top

S

Sandbox in Software Security

Secret Key Cryptography in Software Security

Secure Coding in Software Security

Secure Coding Guidelines in Software Security

Secure SDLC in Software Security

Secure Software Design in Software Security

Secure Software Testing in Software Security

Secured Software Development Life Cycle in Software Security

Security Attack Classes in Software Security

Security Attacks in Software Security

Security Audit in Software Security

Security Models in Software Security

Security Planning in Software Security

Security Policies in Software Security

Security Policy in Software Security

Security Principles in Software Security

Session Hijacking in Software Security

Single Sign-On (SSO) in Software Security

SOA in Software Security

SOA Attacks in Software Security

SOA Security in Software Security

Social Engineering in Software Security

Social Media Security in Software Security

Software Vulnerability in Software Security

Spoofing in Software Security

Spoofing Attacks in Software Security

Spyware in Software Security

SQL Injection in Software Security

SSL in Software Security

Stack Smashing in Software Security

Stream and Block Ciphers in Software Security

Symmetric and Asymmetric key Cryptography in Software Security

System Attacks in Software Security

Go to Top

T

Threat Modeling in Software Security

TPM in Software Security

Transport Layer Security (TLS) in Software Security

Trojan Horse in Software Security

Trust Models in Software Security

Trusted Computing in Software Security

Two-Factor Authentication (2FA) in Software Security

Go to Top

U

User Account Control in Software Security

User Behavior Analytics (UBA) in Software Security

User Input Validation in Software Security

Go to Top

V

Virtual Private Network (VPN) in Software Security

Virus in Software Security

Vulnerability in Software Security

Vulnerability Assessment in Software Security

Go to Top

W

Waterfall Model in Software Security

Web Application Firewall (WAF) in Software Security

Web Application Security in Software Security

Web Server Attacks in Software Security

Web Server Security in Software Security

Web Service in Software Security

Wi-Fi Security in Software Security

Worm in Software Security

WSDL in Software Security

Go to Top

Z

Zero-Day Vulnerability in Software Security

Others

.Net Code Access Security in Software Security

.Net Interoperability in Software Security

.Net managed code in Software Security

.Net Role-Based Security in Software Security

.Net Secure Coding Guidelines in Software Security

Software Quality Assurance (SQA) Glossary
TQM Glossary

Get industry recognized certification – Contact us

keyboard_arrow_up