Cybersecurity Glossary
1506 essential cybersecurity terms explained. Your reference guide from A to Z.
1506Terms
A–ZIndexed
J
JWT
JSON Web Token. A compact, URL-safe token format used for securely transmitting claims between parties, commonly used for authentication and authorization in web applications.
John the Ripper
An open-source password cracking tool that supports various hash formats and attack modes including dictionary, brute-force, and hybrid attacks.
JTAG
Joint Test Action Group. A hardware debugging interface that can be exploited to extract firmware, bypass security controls, or gain root access to embedded devices.
Jailbreaking
The process of removing software restrictions imposed by iOS on Apple devices, allowing installation of unauthorized applications and system modifications.
Jump Server
A hardened server used to access and manage devices in a separate security zone, providing a controlled access point for administrative tasks.
JWT Vulnerability
Security weaknesses in JSON Web Token implementations, including algorithm confusion, weak secrets, and improper signature validation.
Just-in-Time Access
A security practice that provides elevated access only when needed and for the minimum duration required to complete a specific task.
JWT None Algorithm Attack
An attack exploiting JWT implementations that accept the none algorithm, allowing attackers to forge tokens without a valid signature.
JSON Injection
An attack that manipulates JSON data structures sent to an application to modify behavior or extract unauthorized data.
Just-in-Time Provisioning
Automatically creating user accounts and access rights at the moment they are needed rather than pre-provisioning.