Predictable Resource Locations Predictable Resource Location is an attack technique used to uncover hidden web site content and functionality. Privilege Escalation Privilege escalation is using a vulnerability such as a bug, design flaw, or configuration error in an application or operating system to gain privileges other than what was originally intended for the user. Protocol Violation Cyber security protocols are plans, protocols, actions and measures that aim to keep your organization safe from malicious attacks, data breaches and other security incidents. RASP (Runtime Application Self Protecting) Runtime application self-protection (RASP) is a security technology that is built or linked into an application or application runtime environment. Reflected XSS Reflected XSS (Reflected Cross-Site Scripting) attack occurs when the injected malicious script is reflected off the webserver, like the error message, search result, or any other response. Remote File Inclusion (RFI) Remote File Inclusion (RFI) is the process of including files from remote sources through exploitation of vulnerable inclusion procedures implemented in the application. REST/Open API/Swagger Swagger is an open source editor to help users design, define and document RESTful APIs in the Swagger Specification. Restrict Device Access The purpose of implementing a restrict device access policy is to ensure that only authorized devices are permitted to access an organization’s cloud or on-premise environment. Previous ... 7 8 9 10 11 12 ... Next 10 11 12
Predictable Resource Locations Predictable Resource Location is an attack technique used to uncover hidden web site content and functionality.
Privilege Escalation Privilege escalation is using a vulnerability such as a bug, design flaw, or configuration error in an application or operating system to gain privileges other than what was originally intended for the user.
Protocol Violation Cyber security protocols are plans, protocols, actions and measures that aim to keep your organization safe from malicious attacks, data breaches and other security incidents.
RASP (Runtime Application Self Protecting) Runtime application self-protection (RASP) is a security technology that is built or linked into an application or application runtime environment.
Reflected XSS Reflected XSS (Reflected Cross-Site Scripting) attack occurs when the injected malicious script is reflected off the webserver, like the error message, search result, or any other response.
Remote File Inclusion (RFI) Remote File Inclusion (RFI) is the process of including files from remote sources through exploitation of vulnerable inclusion procedures implemented in the application.
REST/Open API/Swagger Swagger is an open source editor to help users design, define and document RESTful APIs in the Swagger Specification.
Restrict Device Access The purpose of implementing a restrict device access policy is to ensure that only authorized devices are permitted to access an organization’s cloud or on-premise environment.