Flashcards in Glossary- H Deck (15):
Someone who interferes with or accesses another’s computer without
The technique of configuring a system so that only its essential services and features are active and all others are deactivated. This helps to reduce the “attack surface” of a system to only its essential components.
Tools and processes used to continuously observe the health, performance, and capacity of one or more computers.
A cryptographic operation on a block of data that returns a fixed- length string of characters, used to verify the integrity of a message.
heating, ventilation, and air conditioning (HVAC)
A system that controls tempera- ture and humidity in a facility.
hierarchical file system (HFS)
A file system used on computers running the Mac OS operating system. See also file system.
A network of computers that is acting as a honeypot. See also honeypot.
A trap that is designed to detect unauthorized use of information systems.
host-based intrusion detection system (HIDS)
An intrusion detection system (IDS) that is installed on a system and watches for anomalies that could be signs of intrusion. See also intrusion detection system (IDS).
An alternate processing center where backup systems are already running and in some state of near-readiness to assume production workload. The systems at a hot site most likely have application software and database management software already loaded and running, perhaps even at the same patch levels as the systems in the pri- mary processing center.
An Ethernet network device that is used to connect devices to the network. A hub can be thought of as a multiport repeater.
The amount of water moisture in the air.
Hypertext Transfer Protocol (HTTP)
A TCP/IP application layer protocol used to transmit webpage contents from web servers to users who are using web browsers.
Hypertext Transfer Protocol Secure (HTTPS)
A TCP/IP application layer protocol that is similar to HTTP in its use for transporting data between web servers and brows- ers. HTTPS is not a separate protocol, but instead is the instance where HTTP is en- crypted with SSL or TLS. See also Hypertext Transfer Protocol (HTTP), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).