- H.323 H.323 is an ITU-T standard for audio and video communication over IP networks such as the Internet or corporate LANs. It provides a framework for multimedia conferencing and includes specifications for call signaling, media transport, and control. H.323 is used by various software and hardware to enable video conferencing and VoIP communications. Note that while Skype, Cisco WebEx, and Zoom may use similar protocols, they do not all specifically use H.323.
- Hacker An individual who uses technical knowledge and expertise to gain unauthorized access to systems, networks, or data. Hackers can be motivated by various reasons, such as curiosity, financial gain, or political activism. Examples of hackers include black hat hackers who engage in illegal activities, white hat hackers who use their skills for defensive purposes, and gray hat hackers who straddle the line between the two.
- Half-duplex mode A communication mode where data can be transmitted and received over a single channel, but not simultaneously. It is used in networking and telecommunications to conserve bandwidth and reduce interference but at the cost of slower data transfer speeds. Examples include using half-duplex mode for older modems or for low-bandwidth connections.
- Handling of Assets The processes and practices associated with managing and protecting an organization's valuable resources, or 'assets.' These assets can include data, hardware, software, and intellectual property. From a security perspective, proper asset handling is vital to prevent unauthorized access, misuse, alteration, or destruction. It typically involves tasks such as asset identification, classification based on sensitivity and criticality, and implementation of appropriate controls (like encryption for data and physical security measures for hardware).
- Handprint scanner A handprint scanner is a type of biometric device that captures the unique patterns and characteristics of an individual's hand, such as the shape, size, and vein patterns, to authenticate identity. Handprint scanners are distinct from fingerprint or palm scanners, as they typically scan the entire hand and not just individual features.
- Handshake In the context of networking, a handshake is a protocol or process used to establish a connection between two systems. A common example is the TCP three-way handshake, which involves a synchronization (SYN) message sent by the client to the server, an acknowledgment of the synchronization (SYN-ACK) sent by the server back to the client, and a final acknowledgment (ACK) sent by the client to the server. This sequence of messages confirms that both parties are ready to communicate and establishes a reliable connection.
- Hard copy key A physical key or token that is used to gain access to a physical location or system. Hard copy keys can be used to unlock doors, start vehicles, or access secure areas and are typically kept on a keychain or other physical device. Examples of hard copy keys include traditional metal keys, keycards, and smart keys.
- Harden The process of strengthening or securing a system, network, or application to protect against potential vulnerabilities or threats. Hardening can involve a range of measures, such as implementing security controls, disabling unnecessary services, or applying patches and updates. Examples of hardening activities include configuring firewalls, disabling unused ports, and applying security patches to operating systems.
- Hardening The process of securing a system by reducing its vulnerability to attack. This is often done by disabling unnecessary services, applying security patches, and using firewalls and intrusion detection systems. It is used in cybersecurity to protect systems from unauthorized access. Examples include disabling unneeded network ports, implementing access controls, and regularly updating software.
- Hardening cloud devices Implementing security measures to protect devices connected to cloud services and the data they handle from threats. It can include techniques like ensuring firmware is up-to-date, using robust access controls, disabling unnecessary services, encrypting data, and configuring network security appropriately. Since cloud devices often handle sensitive data and are connected to the Internet, they can be attractive targets for attackers, making hardening a crucial aspect of maintaining their security.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.