Glossary: H -TEISS® : Cracking Cyber Security

Glossary / Glossary: H

Glossary: H

1-10  a  b  c  d  e  f  g  h  i  j  k  l  m  n  o  p  q  r  s  t  u  v  w  x  y  

Hacker Commonly, an individual who tries to gain unauthorised access to an information system; among cyber security professionals, sometimes used to denote someone who is authorised to break into an IT system in order to detect weaknesses, as opposed to a cracker (qv)
Hacktivism Using hacking techniques to fight for a particular cause
Heartbleed A serious security bug that allowed hackers to steal information that was usually protected by SSL/TLS technology
Hoax In cyber security, a false computer virus warning that may lead the victim to a malicious site; often innocently shared by other naïve computer users
Honeymonkey An automated system that simulates the action of a real internet user, in an attempt to identify malicious websites. Also known as a Honeyclient
Honeypot A trap set to counteract attempts at unauthorized use of informa­tion systems, often a computer holding apparently attractive infor­mation, that appears to be part of a network, but which is in fact isolated and monitored
HTTP Hypertext transfer protocol. The protocol or set of rules that un­derpins the Web; hypertext refers to text or documents that are linked
HTTPS HTTP (qv) that is enhanced by a security mechanism such SSL (qv) encryption. Websites that have HTTPS in their address are likely to me more secure than those that don’t
HTTPS scanning A technical term for a Man in the middle attack (qv)
Hybrid attack An attack that uses several different types of techniques such as a Dictionary Attack (qv) and a Brute Force Attack (qv)
HyperText Transfer Protocol See HTTP

Most Popular

Get the latest cyber news in your inbox

Join our community of cyber professionals today!