Horizontal defense-in-depth
Horizontal defense-in-depth: Horizontal defense-in-depth encompasses the implementation of security measures at the same network layer to create a multi-faceted barrier to threats. It involves using a variety of tools and techniques at a particular point in the network architecture, such that an attacker breaching one control encounters another.
Header manipulation
Header manipulation: Header manipulation refers to the intentional alteration of HTTP header attributes by either a sender or an intermediary, such as a proxy, often to bypass security measures, conduct spoofing attacks, or enhance privacy. It can be used legitimately to control cache or to adjust request-response headers for compatibility, but it can also be […]
Help desk
Help desk: A service provided by an organization to assist users with technical or other issues. It is used to provide support to users who are experiencing problems with their computer systems or software. Examples include providing assistance with password resets, troubleshooting network connectivity issues, and providing guidance on how to use specific software applications.
Heuristic Filter
Heuristic Filter: A program that identifies threats or unwanted content based on general rules and observations rather than specific threat signatures. Unlike traditional filters that rely on a database of known threats, heuristic filters evaluate content based on patterns, behaviors, or certain attributes, making them effective at identifying previously unknown threats or variants of existing […]
Hexadecimal
Hexadecimal: A numerical system that uses 16 symbols (0-9 and A-F) to represent numbers. It is commonly used in computer programming to represent values in memory or to specify color values in web design. Examples include using hexadecimal to specify the RGB color value for a specific shade of blue (#0000FF) or using hexadecimal to […]
Hardening cloud devices
Hardening cloud devices: The process of implementing security measures to protect devices connected to cloud services and the data they handle from threats. This involves steps such as updating firmware, using strong access controls, disabling unnecessary services, encrypting data, and configuring network security to prevent unauthorized access. Since these devices often deal with sensitive data […]