Home Network and application attack terms

118 terms

Network and application attack terms

Network and application attacks target online systems and applications to intercept user and other sensitive data. Below you’ll find the most common network and application attack terms and their definitions.

Hindenbug

A hindenbug is a critical software bug that can lead to a complete (and often dramatic) failure of the system.

Parasite Hosting

Parasite hosting in SEO is when someone uses well-known, high-ranking websites to post content and create links that boost their own site's visibility in search results.

Content spoofing

Content spoofing is a cyberattack that injects additional malicious elements into the content shown to the victim.

Leapfrog Attack

A leapfrog attack is a sophisticated form of cyber intrusion.

Zero-click attack

A zero-click attack is a cyberassault that does not require the victim to provide information or engage in any activity.

Ysoserial

Ysoserial is a programming tool that can be used to exploit Java deserialization vulnerabilities.

XSS

XSS is a cyberattack that exploits website vulnerabilities to inject dangerous scripts into seemingly safe pages.

WEP crack

A WEP crack is an attack that exploits vulnerabilities of the Wired Equivalent Privacy protocol.

The importance of network and application attack terminology

Understanding network and application attack terminology helps you recognize, respond to, and prevent these cyber threats from stealing sensitive data and otherwise harming online systems.

Know what to do

The glossary contains extensive instructions on what to do when you’ve been exposed to DDoS, man-in-the-middle, and SQL injection attacks.

Understand how cyber threats work

Learning how hackers launch network and application attacks will prove useful when you are looking for options on how to safeguard your online systems from exposure.

Notice the threats before they occur

Understanding the most common warning signs of network and application attacks can limit the likelihood of you suffering a cyberattack.

Two women learning cybersecurity terminology.

Online security starts with a click.

Stay safe with the world’s leading VPN

Can’t find an answer to your question?

Ask the questions that matter to you — and get answers from our cybersecurity experts.