Cybersecurity glossary

Exploitation of vulnerabilities and security flaws to gain access to resources or information. For granularity, hacking methods may be placed in separate categories. For instance, bruteforcing credentials to accessible services is distinct from exploitation of vulnerabilities in web applications.