API Terminology Handbook
API Terminology Handbook
API Terminology Handbook
API Terminology
Handbook
swipe
brijpandeyji
Contents
AP CI/C
API Cal CRU
API Econom Cach
API Endpoin Clien
API Integratio DDo
API Gatewa Resourc
API Lifecycl Reques
API Reques Respons
API Key Response Cod
API Laye Payloa
API Porta Paginatio
API Securit Metho
Apige Query Parameter
APIse Authenticatio
Applicatio Rate Limitin
Framewor API Documentatio
Burp Suite Logic Flaw
swipe
brijpandeyji
Contents
JSO RES
Microservice Red Team
Monetizatio SD
OWAS SDL
ZA SOA
Parameter SQL Injectio
Penetration Testin Webhoo
Production Over-Permissioned
Environment Container
END
swipe
brijpandeyji
API
Application Programming Interface is
what API stands for. API is a set of
definitions and protocols that allow
technology products and services to
communicate via the internet.
API Call
swipe
brijpandeyji
API Economy
The API economy is a term to
describe the exchange of value
between a user and an organization.
swipe
brijpandeyji
API Endpoint
API Integration
swipe
brijpandeyji
API Gateway
swipe
brijpandeyji
API Lifecycle
The API lifecycle is an approach to
API management and development
that aims at providing a holistic
view of how to manage APIs
across its different life stages,
from creation to retirement.
API Request
APIs are everywhere and are part of
every aspect of the web. An API request
happens when a developer adds an
endpoint to a URL and uses that endpoint
to call the server or the database.
swipe
brijpandeyji
API Keys
An API key is a unique identifier
that enables other software to
authenticate a user, developer, or
API calling software to an API to
ensure that this person or
software is who it says it is.
API Layer
An API layer is a proxy that joins together all your
service offerings using a graphic UI to provide
greater user interactivity. API layers are
language-agnostic ways of interacting with apps
and help describe the services and data types
used to exchange information.
swipe
brijpandeyji
API Portal
swipe
brijpandeyji
API Security
swipe
brijpandeyji
Apigee
Apigee is an API gateway
management tool offered by
Google to exchange data
across cloud services and
applications.
swipe
brijpandeyji
APIsec
swipe
brijpandeyji
Application
Application software is commonly
defined as a program or a bundle
of different programs designed
for end-users.
Framework
swipe
brijpandeyji
Burp Suite
Burp —also called Burp Suite—
is a set of tools used for
penetration testing of web
apps.
Burp is an all-in-one
penetration testing suite
that offers users a one-stop
shop for all their pen testing
needs.
swipe
brijpandeyji
CI/CD
swipe
brijpandeyji
CRUD
swipe
brijpandeyji
Cache
The cache is a software or hardware
component that stores data so users can
access and retrieve that data faster.
Cached data might be the result of a copy
of certain data stored elsewhere.
Client
swipe
brijpandeyji
DDoS
swipe
brijpandeyji
Resource
An entity that can be
represented by a URI and can
be accessed through an API.
Resources can be anything
from data (such as a list of
users or a single user's
profile) to operations (such
as creating or updating a
resource).
Request
An HTTP request sent by a
client to a server to retrieve or
modify data. A request
typically includes a method, a
URI, and a set of headers and/
or a body.
swipe
brijpandeyji
Response
An HTTP response sent
by a server to a client in
response to a request.
Response Code
swipe
brijpandeyji
Payload
The data sent in an API
request or response,
often in the form of a
JSON object.
Pagination
swipe
brijpandeyji
Method
Query Parameters
swipe
brijpandeyji
Authentication
The process of verifying the
identity of a client or user before
allowing them to access an API. This
is often done using an API key or
other form of credentials.
Rate Limiting
swipe
brijpandeyji
API Documentation
Detailed documentation or
reference material provided by the
creator of an API, explaining how to
use the API and its various
endpoints and parameters.
Logic Flaw
swipe
brijpandeyji
JSON
JSON (JavaScript Object Notation)
is a lightweight data-interchange
format based on a subset of
JavaScript programming language
standards.
swipe
brijpandeyji
Microservices
swipe
brijpandeyji
Monetization
API monetization is a
process by which a
business can create
revenue from its APIs.
swipe
brijpandeyji
OWASP
swipe
brijpandeyji
Over-Permissioned
Container
An over-permissioned
container is a
container that has all
the root capabilities
of a host machine.
swipe
brijpandeyji
Parameters
An argument to a function is
referred to as a parameter.
Adding three numbers, for
example, may require three
parameters.
swipe
brijpandeyji
Penetration Testing
Also called pen testing or
ethical hacking, penetration
testing simulates attacks
on your computer system
to identify exploitable
vulnerabilities.
swipe
brijpandeyji
Production Environment
In a production
environment, software and
other products are actually
put into operation in how
their intended users intend
them to be used.
swipe
brijpandeyji
REST
Created by Roy Fielding, a computer
scientist, REST, which stands for
REpresentational State Transfer, is an
application programming interface
that conforms to the constraints of
REST architectural style and enables a
quicker interaction between different
RESTful web services.
swipe
brijpandeyji
Red Teams
swipe
brijpandeyji
SDK
swipe
brijpandeyji
SDLC
SDLC —also called software
development lifecycle— is
the process for planning,
creating, testing, and
deploying an information
system.
swipe
brijpandeyji
SOAP
Simple Object Access Protocol
(SOAP) is a protocol specification
for exchanging structured
information to implement web
services.
swipe
brijpandeyji
SQL Injection
An SQL injection technique
is a way to inject code into
a database that may
damage it.
swipe
brijpandeyji
Webhook
A webhook (also called a
web callback or HTTP
push API) is a way for an
app to provide other
applications with real-
time information.
swipe
brijpandeyji
ZAP
Also called OWASP Zed Attack
Proxy (ZAP) is one of the
world's most popular free
security tools, which lets you
automatically find security
vulnerabilities in your
applications.
By automating penetration
testing and security
regression testing,
developers can automate an
application's security testing
during the CI/CD process.
With ZAP, you can also do nearly everything you can do with
the desktop interface using its powerful API.
swipe
brijpandeyji
Follow Me On
LinkedIn
https://www.linkedin.com/in/brijpandeyji/