Glossary
#security
Glossary entries tagged with "security".
Entries 5
- Envelope Encryption
Envelope encryption uses a two-layer model: data is encrypted by a DEK, and the DEK itself is encrypted by a KEK.
- IDOR (Insecure Direct Object Reference)
IDOR is a vulnerability where direct object identifiers allow access to resources without proper authorization checks.
- SAPISIDHASH
SAPISIDHASH is an authentication-related hash used by some internal Google APIs to validate request context.
- Tamper Resistance
Tamper resistance is a design property that prevents or makes tampering attempts significantly harder.
- Tampering
Tampering is unauthorized modification, analysis, or extraction against systems, software, or data.
hsb.horse