Application Security

Cyberattack and cybersecurity terms related to application security

Database Interrogation

The process of using basic SQL injections and guesswork to find out information about a database (see Database Fingerprinting).

Device Fingerprinting

Device fingerprinting is a way to combine certain attributes of a device such as OS, browser version, browser language version, IP address to identify it as a unique device.

Distributed Denial of Service (DDoS)

A distributed denial-of-service (DDoS) attack is a malicious method of disrupting the normal traffic of a targeted website, service, server or network.

DNS Spoofing

DNS spoofing, also referred to as DNS cache poisoning, is a form of hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect response, e.g. an IP address.

Executable File upload

An executable file (exe file) contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.

File Path Traversal

A file path traversal attack (also known as directory traversal) is a web security vulnerability that allows an attacker to access files and directories that are stored outside the web root folder.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center