Glossary

2 MINUTES

Preventing SQL Injections

by Bethany Hill on Security • February 18, 2021
What is SQL Injection? An SQL injection is a broad term referring to the exploitation of a bug on a website, that allows an attacker to run malicious SQL statements (commonly referred to as a malicious payload) on your database server.  These attacks can have many purposes:
Read More →
1 MINUTES

SSL/TLS Termination

by Bethany Hill on Security • November 19, 2020
What is SSL/TLS Termination? SSL (Secure Socket Layer) or TLS (Transport Security Layer) is a security protocol used for encrypting traffic between two endpoints, typically a web service and a browser, or a mail server and a mail client, to ensure all data exchanged is secure and confidential.   SSL/TLS secures most of today’s internet traffic. For example: during online transactions or while exchanging sensitive information.
Read More →
1 MINUTES

What is Denial of Service (DoS)?

by Bethany Hill on Security • September 8, 2020
What is Denial of Service (DoS)? Denial of service is a network or web service attack that seeks to maliciously engage network devices and webservers in wasteful processing and storage operations, thereby prohibiting the servicing of requests from legitimate users.
Read More →
1 MINUTES

What is Data Layer Security?

by Bethany Hill on Security • September 7, 2020
What is Data Layer Security? Data layer security refers to security measures applied to data travelling between client and server web applications. 
Read More →
1 MINUTES

What is Data Integrity?

by Bethany Hill on Security • September 4, 2020
What is Data Integrity? Data integrity is a measure of the accuracy and security of data is during storage or transmission.
Read More →
1 MINUTES

What is Cross-Site Scripting?

by Iwan Price-Evans on Security • December 12, 2019
What is Cross-Site Scripting? Cross-site scripting refers to the injection of malicious code into a trusted website for execution on client devices.
Read More →
1 MINUTES

What is an Application Firewall?

by Iwan Price-Evans on Security • August 21, 2019
What is an Application Firewall? An application firewall inspects traffic destined for application servers to detect malicious or suspicious application requests. It can be configured to monitor, log and/or deny such requests.
Read More →
1 MINUTES

What is Buffer Overflow?

by Iwan Price-Evans on Security • August 16, 2019
What is Buffer Overflow? Buffer overflow is a state that occurs when a computer program writes more data into a temporary storage location (buffer) than the capacity of the location.
Read More →
1 MINUTES

What is Anti-Phishing?

by Iwan Price-Evans on Security • August 16, 2019
What is Anti-Phishing? Anti-phishing is a network security strategy for guarding against the unauthorized extraction of user identity information.
Read More →