- High-density equipment High-density equipment refers to hardware designed to maximize computing power or service capacity within a limited physical space. These systems are ideal for environments where space is at a premium, but demand for computational resources is high. Data centers, for instance, use high-density racks to house servers and storage devices efficiently.
- High granularity in data The level of detail or precision in a data set. When data is highly granular, it has a high level of specificity, meaning that it is divided into many small, distinct units. This can be useful for analyzing data in detail, but it can also make it more difficult to process and manage. Examples of data with high granularity include detailed transaction records, sensor data, and social media posts.
- High-level languagesProgramming languages that use a more abstract and human-readable syntax, as opposed to low-level languages that use machine-readable instructions. They are commonly used by software developers to write complex programs or applications, as they are easier to read and understand than low-level languages. Examples include popular high-level languages such as Python, Java, and C++.
- High Performance Computing (HPC) systems A type of computer system that is designed to handle extremely large and complex computing tasks at high speeds. These systems are often used in scientific research, financial modeling, and data analysis. Examples include supercomputers, grid computing systems, and clusters of computers working together.
- Hijacking In cybersecurity, hijacking refers to various forms of unauthorized control over a computing resource, like taking over web sessions, diverting network traffic, or commandeering system functions. It often results in data breaches, service disruption, or facilitating further attacks such as spamming or phishing from a trusted source.
- Hijacking attacks A type of cyberattack in which an attacker takes control of a legitimate user's session or network connection without the user's knowledge or consent. This concept is used in the context of computer security to describe attacks that aim to steal sensitive information or gain unauthorized access to a system. Examples of hijacking attacks include session hijacking, where an attacker takes control of a user's session, and man-in-the-middle attacks, where an attacker intercepts and modifies communications between two parties.
- HITRUST (Health Information Trust Alliance) A common security framework used in the healthcare industry to ensure the privacy and security of electronic protected health information (ePHI). It is used by healthcare organizations to assess and mitigate risks to ePHI and to meet regulatory requirements. Examples of organizations using HITRUST include hospitals, clinics, and insurance companies.
- Hoax A deliberate deception or fabrication, often intended to trick or deceive others. It is commonly used in internet scams or fraudulent emails to lure victims into providing sensitive information or money. Examples include receiving an email claiming to be from a Nigerian prince offering a large sum of money in exchange for a small upfront investment or seeing a social media post claiming that a celebrity has died when they are actually alive and well.
- Holistic redundancy Holistic redundancy refers to a comprehensive approach to backup and fault tolerance that encompasses not just data protection but also system and operational resilience. It involves various strategies like data replication, failover systems, and regular testing to ensure all critical components of an IT ecosystem can withstand disruptions.
- Homomorphic A term used in the context of encryption that refers to the ability to perform computations on encrypted data without decrypting it first. Homomorphic encryption allows for the processing of data while maintaining its ciphertext form, ensuring that the data remains secure even in untrusted environments. Once the computation is performed, the results are also in an encrypted form and can be decrypted only with the appropriate key. This property is particularly valuable for privacy-preserving data analysis and cloud computing, where sensitive data can be processed by external servers without exposing the underlying data to those servers. Homomorphic encryption is an active area of research and can be partial, somewhat, or fully homomorphic, depending on the types and complexity of operations it supports.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.