Security
Hash Table (hash map)
a data structure used to implement an associative array, a structure that can map keys to values. A hash table uses a hash function to compute an index into an array of buckets or slots, from which the desired data can be retrieved.
Denial-of-Service (DoS)
a malicious attempt to render a server or network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the internet.
Social Engineering
a non-technical method of intrusion that hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It may be easier to trick someone into giving away valuable information rather than taking the time to crack passwords.
Credentials
a user's authentication information—typically a password, a token, or a certificate.
Hashing
a way of referencing data in a database. Hashing involves applying a hashing algorithm to a data item, known as a hashing key, to create a hash value. Hashing is used so that searching a database can be done more efficiently, data can be stored more securely, and data transmissions can be checked for tampering.
Password
a word or other string of characters that must be supplied by a user in order to gain full or partial access to a multiuser computer system or its data resources.
Authorization Token
an extra level of security for users logging into a system. A token may be a string which uniquely identifies the user to the service, in addition to their username and password.
Hash Function
any function that can be used to map digital data of arbitrary size to digital data of fixed size.
Salting
in password protection, salt is a random string of data used to modify a password hash. Salt can be added to the hash to prevent a collision by uniquely identifying a user's password, even if another user in the system has selected the same password. Salt can also be added to make it more difficult for an attacker to break into a system by using password hash-matching strategies because adding salt to a password hash prevents an attacker from testing known dictionary words across the entire system.
JavaScript Injection
the act of using Javascript functions and alerts on a website's pages to expose vulnerabilities and information that may provide further access into the site or database.
Session Spoofing (session hijacking)
the exploitation of a valid computer session or session key to gain unauthorized access or services in a computer system.
Hash Value ("hash codes", "hash sums", "hashes")
the values returned by a hash function
0-Day Attack
vulnerability is an undisclosed and uncorrected computer application vulnerability that could be exploited to adversely affect the computer programs, data, additional computers or a network. It is known as a "zero-day" because once a flaw becomes known, the programmer or developer has zero days to fix it.