- Header manipulation Header manipulation refers to the intentional alteration of HTTP header attributes by either a sender or an intermediary, such as a proxy, often to bypass security measures, conduct spoofing attacks, or enhance privacy. It can be used legitimately to control cache or to adjust request-response headers for compatibility, but it can also be utilized maliciously to disguise the true source of traffic or to manipulate web application behaviors.
- Health Information Technology for Economic and Clinical Health Act (HITECH Act) (US) A US law enacted as part of the American Recovery and Reinvestment Act of 2009. The act promotes the adoption and meaningful use of health information technology, specifically electronic health records. One of its significant aspects related to security is that it expands the privacy and security rules of the Health Insurance Portability and Accountability Act (HIPAA), including extending the requirement of safeguarding health information to business associates of covered entities and strengthening the enforcement of HIPAA rules.
- Health Insurance Portability and Accountability Act (HIPAA) (US) A US law passed in 1996 that sets standards for the protection of certain health information. The Privacy Rule, a key component of HIPAA, protects the privacy of individually identifiable health information, and the Security Rule, another key component, sets national standards for the security of electronically protected health information. Compliance with HIPAA requirements ensures that a patient's health information is properly protected while allowing the necessary information to be disclosed for patient care and other important purposes.
- Hearsay evidence Any statement made outside of the courtroom that is presented in court to prove the truth of the matter asserted. In the context of cybersecurity, hearsay could refer to a third-party report or statement about a cyber incident, attack, or vulnerability. Such evidence is generally not admissible in court due to its unverifiable nature, except under certain exceptions. For this reason, proper forensic techniques and chain-of-custody documentation are crucial in collecting and preserving evidence related to cyber incidents.
- Heating, Ventilating, And Air Conditioning (HVAC) The technology and systems used to regulate temperature, air quality, and humidity in a building or space. It is used to ensure the comfort and health of building occupants and to protect sensitive equipment from environmental threats. Examples include thermostats, air filters, and ventilation systems.
- Help desk A service provided by an organization to assist users with technical or other issues. It is used to provide support to users who are experiencing problems with their computer systems or software. Examples include providing assistance with password resets, troubleshooting network connectivity issues, and providing guidance on how to use specific software applications.
- Heuristic Filter A program that identifies threats or unwanted content based on general rules and observations rather than specific threat signatures. Unlike traditional filters that rely on a database of known threats, heuristic filters evaluate content based on patterns, behaviors, or certain attributes, making them effective at identifying previously unknown threats or variants of existing threats. These are commonly used in antivirus programs, spam filters, and intrusion detection systems to provide an additional layer of protection.
- Hexadecimal A numerical system that uses 16 symbols (0-9 and A-F) to represent numbers. It is commonly used in computer programming to represent values in memory or to specify color values in web design. Examples include using hexadecimal to specify the RGB color value for a specific shade of blue (#0000FF) or using hexadecimal to represent the memory address of a specific data value in a computer program.
- Hierarchical database A type of database that organizes data into a tree-like structure, with each record in the database having a single parent record and potentially multiple child records. It is commonly used in applications that need to store and retrieve hierarchical data, such as an organizational chart or a family tree. Examples include storing employee data in a hierarchical database to easily track reporting relationships or using a hierarchical database to store and retrieve genealogical data.
- High Availability The design and implementation of systems and processes to ensure that a service remains available at a high level over a defined period. This often involves redundancy, failover, load balancing, and other mechanisms to minimize downtime in the event of an outage or failure. From a security perspective, high availability is important not only for maintaining business operations but also for sustaining security controls and processes. An HA design can help prevent service disruptions that could be exploited by attackers, or that could lead to other security vulnerabilities.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.