GLOSSARY OF WEB SECURITY TERMS

 

Secure Sockets Layer (SSL)

A form of transaction that protects information being transmitted over the Internet to prevent tampering while it's in transit (from Bank One website). Used by basically every e-commerce web site to protect their transactions.
Secure Server More than just referring to web server which uses SSL protocol; also means reliable, backed up, expandable, resistant to attack. (O'Reilly)
Certificate Authority Authority trusted by one or more users to create and assign certificates. (from Wilde's WWW Online Glossary)
Digital Certificate A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web. It is issued by a certification authority. It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real. (Sans)
Certificate-Based Authentication Certificate-Based Authentication is the use of SSL and certificates to authenticate and encrypt HTTP traffic. (Sans)
Encryption Encoding data into a form that conceals the data's original meaning to prevent it from being known or used.
PCT (Private Communication Technology) Microsoft designed PCT to try to improve on Netcape's SSL, but was stopped when SSL was generalized as IETF's TLS protocol. You still might see a few sites such as Expedia say they use it.
TLS(Transport Layer Security) Developed as successor to SSL, main difference that TLS implements open and standards-based solution.
Cross-Site Scripting Cross Site scripting (XSS) is a type of attack that can be carried out to steal sensitive information belonging to the users of a web site. This relies on the server reflecting back user input without checking for embedded javascript. (Owasp)
SQL Injection Technique by which attackers can execute SQL statements of their choice on the backend database by manipulating the input to the application.(Owasp)
Buffer Overflow A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. (Sans)
Denial of Service The prevention of authorized access to a system resource or the delaying of system operations and functions (Sans)
Trojan Horse A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program. (Sans)
Phishing When you receive an official looking yet fake email directing you to what looks like a company web site in order to collect financial or password information
Zero-Day New, unknown vulnerability which is difficult to guard against
Mobile Code Programs that augments functionality of browsers by asking users to download and run additional programs (Ex. Plug-Ins, ActiveX,Java, Flash)
SET (Secure Electronic Transaction) Secure Electronic Transactions is a protocol developed for credit card transactions in which all parties (customers, merchant, and bank) are authenticated using digital signatures, encryption protects the message and provides integrity, and provides end-to-end security for credit card transactions online. (Sans)Fallen out of favor, but could still return

 

Extremely comprehensive glossary can be found on Sans Institute's Glossary as well as Wilde's WWW Online Glossary