owasp.org

Website:http://www.owasp.org
Upvotes received1
Downvotes received2
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (270)

1

1 Thumbs up   1 Thumbs down

key establishment


The process of agreeing on a shared secret, where both parties contribute material to the key.
Source: owasp.org

2

0 Thumbs up   0 Thumbs down

access control list


A list of credentials attached to a resource indicating whether or not the credentials have access to the resource. Also referred to as an ACL. ACL's are typically used for authorizing actions in [..]
Source: owasp.org

3

0 Thumbs up   0 Thumbs down

active attack


Any attack that involves actions that are detectable as an attack by the target. A port scan is active because it can be detected by the remote host. Of course it isn't really an attack. An activ [..]
Source: owasp.org

4

0 Thumbs up   0 Thumbs down

advanced encryption standard


A fast general-purpose block cipher standardized by NIST (the National Institute of Standards and Technology). The AES selection process was a multi-year competition, where Rijndael was the winning ci [..]
Source: owasp.org

5

0 Thumbs up   0 Thumbs down

anti-debugger


Referring to technology that detects or thwarts the use of a debugger on a piece of software.
Source: owasp.org

6

0 Thumbs up   0 Thumbs down

anti-tampering


Referring to technology that attempts to thwart the reverse engineering and patching of a piece of software in binary format.
Source: owasp.org

7

0 Thumbs up   0 Thumbs down

architectural security assessment


See also: Threat Model
Source: owasp.org

8

0 Thumbs up   0 Thumbs down

asn.1


Abstract Syntax Notation is a language for representing data objects. It is popular to use this in specifying cryptographic protocols, usually using DER (Distinguished Encoding Rules), which allows th [..]
Source: owasp.org

9

0 Thumbs up   0 Thumbs down

asymmetric cryptography


Cryptography involving public keys, as opposed to cryptography making use of shared secrets.
Source: owasp.org

10

0 Thumbs up   0 Thumbs down

audit


In the context of security, a review of a system in order to validate the security of the system. Generally, this either refers to code auditing or reviewing audit logs.
Source: owasp.org


To view all 270 definitions, please sign in.