H Flashcards
HA
High Availability
Ensuring that system uptime extends longer than what it
normally would.
HDD
Hard Disk Drive
A mass storage system, typically implemented with
spinning platters and heads that perform reading and
writing.
HIDS
Host-based Intrusion Detection System
A defensive application that identifies anomalous or
malicious activities within a device.
HIPS
Host-based Intrusion Prevention System
A defensive application that prevents anomalous or
malicious activities within a device.
HMAC
Hashed Message Authentication Code
Implementing non-repudiation via an exchanged value
and hashing.
Honeynet
Honeypot network
A sophisticated system designed to locate, discover,
distract and otherwise observe malicious behavior.
Honeypot
Fake target
Used to identify and distract hackers.
Host firewall
Software firewall
The last line of defense for a system against a malicious
intranet host.
hosts
Local resolver
This is a file wherein the system manager may define
their own names to resolve IP addresses.
HOTP
HMAC-based One-Time Password
Performs authentication by requiring a user to enter a
system generated code into a hashing or calculating
algorithm that produces a response.
HSM
Hardware Security Module
These key management systems are ideally suited for
automated private key transactions that require strong
security.
HSMaaS
Hardware Security Module as a Service
A cloud-based service that allows customers to create,
manage and implement encryption keys.
HTML
Hypertext Markup Language
The scripting used by browsers to interpret and display
content.
HTTP
Hypertext Transfer Protocol
The means by which HTML and images are viewed and
accessed by browsers.
HTTPS
Hypertext Transfer Protocol over SSL/TLS
Performing HTTP over an encrypted channel.