Solutions
 

Application Security

Cyberattack and cybersecurity terms related to application security

Broken Access Control

Broken Access Control vulnerabilities exist when a user can access resource or perform an action that they are not supposed to be able to access or do.


Brute Force Attack

A Brute Force password attack is a method of accessing a secured device or application by attempting multiple combinations of accepted character sets of usernames and\or passwords, using guessing tools and scripts, in order to try all the combinations of well-known usernames and passwords.


Cache Key Injection

Cache keys are parts of an HTTP request that the cache will use to uniquely identify a response.


Cache Poisoning

Cache poisoning refers to a security vulnerability where invalid entries can be placed into a cache, which are then assumed to be valid when later used.


CIA Triad

The CIA Triad is a model for the development of security policies used in identifying problem areas, along with necessary solutions in the arena of information security.


Clickjacking

Clickjacking is a type of exploit online, where hackers hide malware or malicious code in a legitimate-looking control on a website.


Code Injection

Code injection is the malicious injection or introduction of code into an application.


Command Injection

Command injection is an attack method in which a hacker alters dynamically generated content on a web page by entering HTML code into an input mechanism.


Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia