Glossary- H Flashcards Preview

CISA > Glossary- H > Flashcards

Flashcards in Glossary- H Deck (15):
1

hacker

Someone who interferes with or accesses another’s computer without
authorization.

2

hardening

The technique of configuring a system so that only its essential services and features are active and all others are deactivated. This helps to reduce the “attack surface” of a system to only its essential components.

3

hardware monitoring

Tools and processes used to continuously observe the health, performance, and capacity of one or more computers.

4

hash function

A cryptographic operation on a block of data that returns a fixed- length string of characters, used to verify the integrity of a message.

5

heating, ventilation, and air conditioning (HVAC)

A system that controls tempera- ture and humidity in a facility.

6

hierarchical file system (HFS)

A file system used on computers running the Mac OS operating system. See also file system.

7

honeynet

A network of computers that is acting as a honeypot. See also honeypot.

8

honeypot

A trap that is designed to detect unauthorized use of information systems.

9

host-based intrusion detection system (HIDS)

An intrusion detection system (IDS) that is installed on a system and watches for anomalies that could be signs of intrusion. See also intrusion detection system (IDS).

10

hot site

An alternate processing center where backup systems are already running and in some state of near-readiness to assume production workload. The systems at a hot site most likely have application software and database management software already loaded and running, perhaps even at the same patch levels as the systems in the pri- mary processing center.

11

hub

An Ethernet network device that is used to connect devices to the network. A hub can be thought of as a multiport repeater.

12

humidity

The amount of water moisture in the air.

13

Hypertext Transfer Protocol (HTTP)

A TCP/IP application layer protocol used to transmit webpage contents from web servers to users who are using web browsers.

14

Hypertext Transfer Protocol Secure (HTTPS)

A TCP/IP application layer protocol that is similar to HTTP in its use for transporting data between web servers and brows- ers. HTTPS is not a separate protocol, but instead is the instance where HTTP is en- crypted with SSL or TLS. See also Hypertext Transfer Protocol (HTTP), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).

15

hypervisor

Virtualization software that facilitates the operation of one or more vir- tual machines.