Security Glossary

Key terms and concepts in AI pentesting, application security, and autonomous vulnerability discovery.

A

Agentic Pentesting

A multi-agent approach to penetration testing where specialized AI agents collaborate to find and exploit vulnerabilities.

AI Penetration Testing

The use of artificial intelligence agents to autonomously discover, exploit, and report security vulnerabilities in software systems.

AI Security Testing

The application of artificial intelligence and machine learning techniques to automate and enhance security testing processes.

API Security

The practice of protecting APIs from threats and vulnerabilities, covering authentication, authorization, rate limiting, and input validation.

Application Security (AppSec)

The discipline of protecting applications from threats by finding, fixing, and preventing security vulnerabilities throughout the software lifecycle.

Attack Simulation

The practice of emulating real-world cyber attacks against systems to evaluate defensive capabilities and identify security gaps.

Attack Surface

The sum of all points in a system where an attacker can attempt to enter or extract data, including APIs, UI components, and network services.

Attack Surface Management (ASM)

The continuous discovery, inventory, classification, and monitoring of an organization's internet-facing assets and their security posture.

Automated Pentesting

Penetration testing that uses automated tools and scripts to discover and exploit vulnerabilities with minimal human involvement.

Automated Security Testing

The use of software tools to automatically test applications and systems for security vulnerabilities without manual intervention.

Autonomous Pentesting

Security testing that runs end-to-end without human intervention, from reconnaissance through exploitation to reporting.

B

C

CI/CD Security

Protecting continuous integration and delivery pipelines from attacks and integrating security checks into automated build and deployment processes.

Clickjacking

An attack that tricks users into clicking hidden elements on a transparent overlay, performing unintended actions on a trusted website.

Cloud Security

The set of policies, technologies, and controls that protect cloud-based systems, data, and infrastructure from threats.

Command Injection

A vulnerability that allows attackers to run arbitrary operating system commands on the server through a vulnerable application.

Compliance

Adherence to security standards, regulations, and frameworks that govern how organizations protect data and manage risk.

Continuous Pentesting

An approach to security testing where penetration tests run regularly or on every change, rather than as periodic engagements.

Continuous Security Testing

An approach where security tests run continuously or on every code change, providing ongoing assurance rather than point-in-time assessments.

Cross-Site Request Forgery (CSRF)

An attack that tricks authenticated users into submitting unintended requests to a web application they are logged into.

Cross-Site Scripting (XSS)

A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

Crowdsourced Security

A security testing model that leverages a community of independent researchers to find vulnerabilities, typically through bug bounty programs.

CVE (Common Vulnerabilities and Exposures)

A standardized identification system for publicly known cybersecurity vulnerabilities, providing unique IDs like CVE-2024-12345.

CVSS (Common Vulnerability Scoring System)

A standardized framework for rating the severity of security vulnerabilities on a 0-10 scale, used to prioritize remediation efforts.

D

E

F

H

I

L

M

N

O

P

R

S

T

V

W

X

Z