Cybersecurity Glossary
1506 essential cybersecurity terms explained. Your reference guide from A to Z.
1506Terms
A–ZIndexed
O
OWASP
Open Web Application Security Project. A nonprofit organization that produces freely available methodologies, tools, and documentation for web application security.
OWASP Top 10
A regularly updated report outlining the ten most critical web application security risks, serving as a standard awareness document for developers and security professionals.
Open Redirect
A vulnerability where a web application redirects users to an attacker-controlled URL, commonly exploited in phishing attacks to make malicious links appear legitimate.
OAuth
An open authorization framework that allows third-party applications to access user resources without exposing credentials, widely used for social login and API authorization.
OAuth Token Theft
An attack where OAuth access tokens or refresh tokens are stolen through vulnerabilities, enabling unauthorized access to protected resources and APIs.
OSINT
Open Source Intelligence. The collection and analysis of publicly available information from sources like social media, websites, and public records for security assessment.
OT Security
Operational Technology security. The practice of protecting hardware and software that monitors and controls physical devices and processes in industrial environments.
OWASP Mobile Top 10
A list of the ten most critical security risks facing mobile applications, maintained by OWASP as a guide for mobile application developers.
Output Encoding
The practice of converting special characters in output data to their safe equivalents, preventing injection attacks like XSS when data is rendered in browsers.
OSCP
Offensive Security Certified Professional. A hands-on penetration testing certification from Offensive Security requiring a 24-hour practical exam.
OSINT Reconnaissance
The process of gathering publicly available information about a target organization to support penetration testing, including domains, employees, and technologies.
One-Time Pad
A theoretically unbreakable encryption technique using a random key the same length as the message, used only once and then discarded.
OIDC
OpenID Connect. An identity layer built on top of OAuth 2.0 that allows clients to verify user identity and obtain basic profile information.
OSWE
Offensive Security Web Expert. An advanced certification focused on white-box web application penetration testing requiring source code analysis skills.
OSEP
Offensive Security Experienced Penetration Tester. An advanced certification covering evasion techniques, custom exploits, and advanced lateral movement.
OCSP
Online Certificate Status Protocol. A protocol for checking the revocation status of X.509 digital certificates in real time.
osquery
An open-source tool that exposes operating system information through SQL queries, enabling security monitoring and endpoint visibility.
OpenVPN
An open-source VPN protocol that uses SSL/TLS for key exchange and supports multiple encryption algorithms and authentication methods.
OSPF
Open Shortest Path First. An interior gateway routing protocol that uses link-state information to construct a topology map for optimal packet routing.
Overlay Attack
A mobile attack where a malicious app displays a fake interface on top of a legitimate app to steal credentials or intercept actions.
OAuth Misconfiguration
Security weaknesses in OAuth implementations including open redirectors, insecure token storage, and improper scope validation.
OSED
Offensive Security Exploit Developer. An advanced certification covering Windows exploit development including reverse engineering and shellcoding.
Objective-Based Penetration Testing
Testing focused on achieving specific business-impact objectives rather than finding all vulnerabilities.
OSSTMM
Open Source Security Testing Methodology Manual. A comprehensive methodology for security testing covering all aspects of operational security.
OWASP API Security Top 10
A list of the most critical security risks to APIs, including broken object-level authorization, authentication failures, and excessive data exposure.
Origin Validation
The server-side practice of verifying the Origin header in HTTP requests to prevent cross-origin attacks.
Orphaned Account
A user account that remains active after the associated person has left the organization, creating a security risk.
Offensive Security Career Path
The professional progression from junior pentester through senior consultant, red team lead, and offensive security director.
Output Escaping
Converting special characters to their safe equivalents when rendering user data in HTML, JavaScript, or SQL contexts.
ORM Security
Security considerations when using Object-Relational Mapping frameworks, including injection risks and query optimization.
Oblivious Transfer
A cryptographic protocol where a sender transfers information to a receiver without knowing which pieces were received.
Open Source Security
Practices for managing security risks in open-source software including vulnerability monitoring and license compliance.