Glossary G-H-I Flashcards
gait analysis
Biometric mechanism that identifies a subject based on movement pattern.
GCM (Galois/Counter Mode)
A mode of block chained encryption that provides message authenticity for each block.
GDPR (General Data Protection Regulation)
Provisions and requirements protecting the personal data of European Union (EU) citizens. Transfers of personal data outside the EU Single Market are restricted unless protected by like-for-like regulations, such as the US’s Privacy Shield requirements.
geofencing
The practice of creating a virtual boundary based on real-world geography.
geolocation
The identification or estimation of the physical location of an object, such as a radar source, mobile phone, or Internet-connected computing device.
GPO (Group Policy Object)
On a Windows domain, a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, and so on.
grep command
Linux command for searching and filtering input. This can be used as a file search tool when combined with ls.
group account
A group account is a collection of user accounts that are useful when establishing file permissions and user rights because when many individuals need the same level of access, a group could be established containing all the relevant users.
HA (high availability)
The property that defines how closely systems approach the goal of providing data availability 100 percent of the time while maintaining a high level of system performance.
hardening
The process of making a host or app configuration secure by reducing its attack surface, through running only necessary services, installing monitoring software to protect against malware and intrusions, and establishing a maintenance schedule to ensure the system is patched to be secure against software exploits.
hashcat
Command-line tool used to perform brute force and dictionary attacks against password hashes.
hashing
A function that converts an arbitrary length string input to a fixed length string output. A cryptographic hash function does this in a way that reduces the chance of collisions, where two different inputs produce the same output. Also known as message digest.
head command
Linux utility for showing the first lines in a file.
heat map
In a Wi-Fi site survey, a diagram showing signal strength at different locations.
heuristic analysis (heuristic)
A method that uses feature comparisons and likenesses rather than specific signature matching to identify whether the target of observation is malicious.
HMAC (hash-based message authentication code)
A method used to verify both the integrity and authenticity of a message by combining a cryptographic hash of the message with a secret key.
homomorphic encryption
Method that allows computation of certain fields in a dataset without decrypting it.
honeypot (honeynet)
A host, network, or file set up with the purpose of luring attackers away from assets of actual value and/or discovering attack strategies and weaknesses in the security configuration. Also known as honeyfile.
horizontal privilege escalation
When a user accesses or modifies specific resources that they are not entitled to.
host-based firewall
A software application running on a single host and designed to protect only that host. Also known as personal firewall.
hot site
A fully configured alternate network that can be online quickly after a disaster.
hot/cold aisle
Arrangement of server racks to maximize the efficiency of cooling systems. Also known as cold/hot aisle.