Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
A programming language used to manage and manipulate relational databases.
Example: An analyst writes an SQL query to retrieve customer data from a company's database.
See also: MySQL
A type of attack where malicious SQL code is inserted into a database query to manipulate or steal data.
Example: An attacker enters specially crafted input into a website's login field to bypass authentication and access the database.
An open-source relational database management system.
Example: The website stored user data in a MySQL database.
See also: SQL
A security tool that monitors and filters HTTP traffic to protect web applications from attacks like SQL injection and cross-site scripting.
Example: A WAF blocks malicious requests attempting to exploit a vulnerability in an online application.