Glossary

Discover more tech articles and guides on cybersecurity, media delivery, edge computing, and content delivery network (CDN).

Select from the list below to learn more.

Account Takeover

ACK Flood

Advanced Compression

Advanced Persistent Threat (APT)

Amplified DDoS Attacks

Anomaly Detection

Anti-Bot Tools

Anycast

API Abuse

API Performance

API Security

API Security Risks

API Testing

Application Acceleration

Application Acceleration

Application Delivery

Application Delivery Controller

Application Layer DDoS Attacks

Application Layer Security

ARP Spoofing

Attack Vector

Auto Scaling

Backdoor

Behavioral Analysis

Big Data

Bitrate Ladder

Bot Attacks: Navigating Today’s Automated Threat Landscape

Bot Detection

Bot Management

Bot Mitigation

Bot Network

Botnet

Botnet Attacks

Broken Object Level Authorization

Brute Force Attacks

Buffer Overflow

CAPTCHA

CDN (Content Delivery Network)

CDN and SSL/TLS

CDN Services

CLDAP Reflection DDoS Attack

Clickjacking

Cloud CDN

Cloud Databases

Cloud Infrastructure

Cloud Migration

Cloud Platform

Cloud-Native Applications

Command Injection

Control Plane

Cookie Poisoning

Credential Stuffing

Credit Card Cracking

Cross Site Scripting (XSS)

Cross-Site Request Forgery (CSRF) Attack

DASH(Dynamic Adaptive Streaming over HTTP)

Data Breach

Data Encryption

Data Lakes

Data Leakage Protection (DLP)

Data Scraping

Data Security

Data Sovereignty

Decoding

Denial of Service (DoS)

Device Fingerprinting

Dictionary Attacks

Disaster Recovery Solutions

Distributed Cloud

Distributed Denial of Service Attacks (DDoS)

DNS Load Balancing

DNS Protection

DNS Resolution

DNS Servers

DNS Traffic Management

Domain Generation Algorithms

Domain Name Server (DNS) Hijacking

Domain Name System (DNS)

DRM (Digital Rights Management)

Edge AI

Edge Servers

Encoding

Enterprise Application Security

Failover Solutions

Fork Bomb Attack (Rabbit Virus)

Geo-blocking

Geolocation-based Routing

HLS (HTTP Live Streaming)

HTML Injection

HTTP & HTTPS

HTTP Flood DDoS Attacks

HTTP Parameter Pollution (HPP)

HTTP Verb Tampering

HTTP/2

Hybrid Cloud Security

ICMP Flood

Images and Resolutions

Incident Response

Infrastructure as a Service (IaaS)

Injections

Intelligent Compression

Lateral Movement

Least Connections

Load Balancing

Malware Types

Man in the Middle (MitM)

Man-in-the-Browser (MitB) Attack

Media Streaming

Memcached Amplification DDoS Attack

Memcached DDoS Attack

Multi-Factor Authentication (MFA) Services

Network Latency

NoSQL Injection

NTP Amplification DDoS Attack

Null Connection Flood Attack

Origin Server

Origin Shielding

OTT (Over-The-Top)

OWASP Top 10

Packet Switching

Packets

Ping of Death

Ports

Prefetching

Private Cloud

Progressive Download

Protocol DDoS Attacks

Public Cloud

Rate Limiting

Rate Throttling

Real-Time Streaming Protocol (RTSP)

Remote Access Trojan

Remote File Inclusion (RFI)

REST API

Reverse Proxy

Round Robin

Round Trip Time (RTT)

Route Optimization

Scraping

SD-WAN

Secure Internet Gateway

Segmented Network

Sensitive Data Exposure (Data Leakage)

Serverless Computing

Service Mesh

Session Fixation

Shadow API

Slow Post Attack

Slowloris Attack

Slowloris DDoS Attack

Smurf DDoS attack

SQL Injection (SQLi)

SSDP Amplification DDoS Attack

SSL Flood and SSL Renegotiation Attacks

SSL Offloading

SSL/TLS Exhaustion DDoS Attacks

Stream Fragmentation

TCP Data Flood

TCP Optimization

Threat Intelligence

Threat Signatures

Time To Live (TTL)

Traffic Bots

Traffic Scrubbing

Transparent Proxy

Two Factor Authentication (2FA)

Understanding Volumetric DDoS Attacks: Scale, Impact, and Defense

Video Streaming

Virtual Machine

Virtual Patching

Virtual Private Server (VPS)

VOD

WAAP (Web Application and API Protection)

WAN Acceleration

Web Application Attack

Web Scraping

Web Shell

Web Skimming

WebRTC

What Are API Attacks?

What Are QUIC and HTTP/3?

What Are SYN Flood DDoS Attacks?

What Are Zero Trust Networks?

What is a Carding Attack? How to Prevent it?

What Is a DNS Amplification Attack?

What is a LAND Attack?

What Is a Media Server?

What Is a Phishing Attack?

What Is a UDP Flood DDoS Attack?

What Is a Zero-Day Attack?

What is an API

What Is API Sprawl?

What is Cache

What Is DNS?

What Is Edge Computing?

What Is Hybrid Cloud?

What Is Multicloud?

What is Packet Loss?

What is Ransomware?

What Is Remote Work Security?

What Is Spear Phishing?

What is SRT?

What is Throughput?

What Is Zero Trust Networking?

XXE (XML External Entity)