Important definitions and terminologies used in Software Security
A
Access Control in Software Security
ActiveX in Software Security
Agile or Extreme development model in Software Security
Android Security in Software Security
Application Security in Software Security
ASP.NET Web Application Security in Software Security
Asset in Software Security
Attack Vector in Software Security
Audit Trail in Software Security
Authentication in Software Security
Authentication Attacks in Software Security
Authentication Controls in Software Security
Authorization in Software Security
Availability in Software Security
B
Backdoor in Software Security
Big Data Security in Software Security
Biometric Authentication in Software Security
Botnet in Software Security
Buffer Overflow in Software Security
C
C/C++ Dynamic Memory Management in Software Security
C/C++ Exception Handling in Software Security
C/C++ Formatted Functions in Software Security
C/C++ Integer Overflow in Software Security
C/C++ Pointers in Software Security
C/C++ String Issues in Software Security
Certificate Authority in Software Security
Cloud Computing in Software Security
Cloud Security in Software Security
Code Injection in Software Security
Command Injection in Software Security
Common Vulnerabilities and Exposures (CVE) in Software Security
Compliance in Software Security
Computer Emergency Response Team (CERT) in Software Security
Computer Security in Software Security
Confidentiality in Software Security
Cross-Site Request Forgery (CSRF) in Software Security
Cross-Site Scripting (XSS) in Software Security
Cryptography in Software Security
D
Data Breach in Software Security
Defense in Depth in Software Security
Denial of Service (DoS) in Software Security
Digital Asset in Software Security
Digital Signature in Software Security
E
Encryption in Software Security
Endpoint Security in Software Security
Exploit in Software Security
F
File Integrity Monitoring in Software Security
Firewall in Software Security
Format String Attack in Software Security
G
Globbing Hacks in Software Security
H
Hacking in Software Security
Hash Function in Software Security
Heap Corruption in Software Security
I
Incident Response in Software Security
Input Validation in Software Security
Integer Overflows in Software Security
Integrity in Software Security
iOS Security in Software Security
IoT Security in Software Security
J
Java Access Control in Software Security
Java Permissions and Security Policy in Software Security
Java RMI in Software Security
Java Secure Class Loading in Software Security
Java Security in Software Security
K
Kerberos in Software Security
L
Least Privilege in Software Security
Log Management in Software Security
M
Malware in Software Security
Memory Corruption in Software Security
Message Authentication in Software Security
Mobile Security in Software Security
Multi-Factor Authentication in Software Security
N
Network Attacks in Software Security
Network Security in Software Security
Networking in Software Security
O
Open Web Application Security Project (OWASP) in Software Security
P
Password Policy in Software Security
Patch Management in Software Security
Penetration Test Report in Software Security
Penetration Testing in Software Security
Permission in Software Security
Phishing in Software Security
Physical Security in Software Security
Privacy in Software Security
Private and Public Key Exchange in Software Security
Programming Attacks in Software Security
Public Key Infrastructure in Software Security
R
Remote Code Execution in Software Security
Risk Assessment in Software Security
Risk Management in Software Security
S
Sandbox in Software Security
Secret Key Cryptography in Software Security
Secure Coding in Software Security
Secure Coding Guidelines in Software Security
Secure SDLC in Software Security
Secure Software Design in Software Security
Secure Software Testing in Software Security
Secured Software Development Life Cycle in Software Security
Security Attack Classes in Software Security
Security Attacks in Software Security
Security Audit in Software Security
Security Models in Software Security
Security Planning in Software Security
Security Policies in Software Security
Security Policy in Software Security
Security Principles in Software Security
Session Hijacking in Software Security
Single Sign-On (SSO) in Software Security
SOA in Software Security
SOA Attacks in Software Security
SOA Security in Software Security
Social Engineering in Software Security
Social Media Security in Software Security
Software Vulnerability in Software Security
Spoofing in Software Security
Spoofing Attacks in Software Security
Spyware in Software Security
SQL Injection in Software Security
SSL in Software Security
Stack Smashing in Software Security
Stream and Block Ciphers in Software Security
Symmetric and Asymmetric key Cryptography in Software Security
System Attacks in Software Security
T
Threat Modeling in Software Security
TPM in Software Security
Transport Layer Security (TLS) in Software Security
Trojan Horse in Software Security
Trust Models in Software Security
Trusted Computing in Software Security
Two-Factor Authentication (2FA) in Software Security
U
User Account Control in Software Security
User Behavior Analytics (UBA) in Software Security
User Input Validation in Software Security
V
Virtual Private Network (VPN) in Software Security
Virus in Software Security
Vulnerability in Software Security
Vulnerability Assessment in Software Security
W
Waterfall Model in Software Security
Web Application Firewall (WAF) in Software Security
Web Application Security in Software Security
Web Server Attacks in Software Security
Web Server Security in Software Security
Web Service in Software Security
Wi-Fi Security in Software Security
Worm in Software Security
WSDL in Software Security
Z
Zero-Day Vulnerability in Software Security
Others
.Net Code Access Security in Software Security
.Net Interoperability in Software Security
.Net managed code in Software Security
.Net Role-Based Security in Software Security
.Net Secure Coding Guidelines in Software Security