Terminology

Security Terminology

Backup

Backing up or running a backup, is the result of the copying and archiving data so it may be used later to restore the original after a data loss event for example. Backups are useful in 2 situations: Recover data after its loss, deletion or even corruption. Recover data from the past (depending on the data […]

Read more

Vulnerability

A vulnerability is a weakness. This weakness allows someone to reduce a system’s information assurance. A vulnerability is the intersection of 3 elements: a system susceptibility or flaw, an attacker access to the flaw, an attacker capability to exploit the flaw.

Read more

Vulnerable

In computer security, when something becomes vulnerable, that means an attacker can now try to exploit a vulnerability on this system. Your website can be vulnerable to an special attack, you computer can be vulnerable too, and or course humans are vulnerables too, specially when you are targeted by phishing emails.

Read more

Security Flaw

A security flaw is a involuntary weakness despite the developer and in contrary of a malicious flaw. This is a vulnerability, that can be exploited but not designed to be. Usually the developer takes this seriously and release a patch to fix this security flaw. Security flaws are not created but discovered.

Read more

XSS Attack

Cross-Site Scripting (XSS) attacks are a type of vulnerability called “injection”. Some malicious scripts can be injected into trusted web sites. XSS attacks occurs when an attacker is sending malicious code, generally in the form of a browser, to a different browser/visitor. The flaws allowing these attacks to succeed are badly widespread and occurs anywhere in any input […]

Read more