Application Security

Cyberattack and cybersecurity terms related to application security

Insufficient Logging and Monitoring

Insufficient logging and monitoring refers to a security event not being correctly detected, logged and monitored to ensure adequate and timely response to the incident or breach.

IP reputation

An IP address with a strong history of non-malicious activity, for example, that has never been associated with malicious behaviour or malware...

JavaScript challenge

JavaScript Challenge is a method that is used in DDoS mitigation to filter out requests that are characteristic of a botnet or other malicious computer.

jQuery Injection

jQuery is a small, fast, feature-rich JavaScript library ('write less, do more') commonly used in web applications. jQuery takes a lot of common tasks that require many lines of JavaScript ...


Kubernetes, also known as K8s, is a portable, extensible, open-source orchestration tool for automating deployment, scaling, and management of containerized applications.

LDAP Injection

LDAP injection is a code injection technique used to exploit web applications which could reveal sensitive user information or modify information represented in the LDAP (Lightweight Directory Access Protocol) data stores.

Logout management

Logout management refers to the process of having secure session termination controls that governs interactions between a web-based application and users.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center