The FREE Cybersecurity Glossary by Thor Pedersen!
Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.
- Hardwired Key
Hardwired Key: A hardwired key in cryptography is a secret key that is embedded directly within hardware and is not designed to be modified or replaced. This type of key is used for specific cryptographic functions and is known for its resistance to extraction or tampering due to its physical integration into the hardware.
- Hash collision
Hash collision: A hash collision occurs when two distinct inputs produce identical hash values using the same hashing algorithm. Collisions present a security concern, as they may be exploited to deceive systems relying on hashes for data integrity verification. Strong hashing algorithms are designed to minimize the probability of collisions.
- Hashed Message Authentication Code (HMAC)
Hashed Message Authentication Code (HMAC): A cryptographic technique that uses a hash function and a secret key to verify the authenticity and integrity of a message. It is used in secure communication protocols to prevent tampering and replay attacks. Examples of HMAC include using it to authenticate HTTP requests and verify the authenticity of digital signatures.
- Hash (hashing)
Hash (hashing): The process of converting data into a fixed-length, unique value known as a hash. This is used in cryptography to verify the integrity of data, as any change to the data will result in a different hash value. Examples of hashing include using a hash function to create a digital signature and generating a checksum for a file.
- Hashing Function
Hashing Function: An algorithm that maps data of any size to a fixed size. The output, or hash, is a string of characters that represents the input data. In security, hash functions are used for a variety of purposes, including data integrity checks, password storage, and digital signatures. A secure hash function has the property that it's computationally infeasible to derive the original input from its hash, making it useful for storing sensitive information like passwords in a form that prevents their recovery even if the hash is known.
- Hash Value
Hash Value: A fixed-length string output produced by a hash function, uniquely representing input data. Any change to the input will result in a different hash value, which is used for password hashing, digital signatures, and data integrity verification.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access