Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
H
H()
H(i)
H(M)
H(x)
H.323
HA
Hacker
HAG
HAIPE
HAIPE-IS
Hand Receipt
Hand Receipt Holder
Handshake
Hard Copy Key
Hard Disk
Hardening
Hardware
Hardware Description Language
Hardware Driver
Hardwired Key
Harm
Hash
Hash (M)
Hash Algorithm
Hash Code
Hash Function
Hash Message Authentication Code
Hash Output
Hash Value
Hash Value/Result
hash( )
Hash-Based Key Derivation Function
Hash-Based Message Authentication Code
Hashed
Hashed Message Authentication Code
Hashed Next Secure
Hashing
Hashing Algorithm
Hashword (C.F.D.)
Hazardous Materials
Hazards Of Electromagnetic Radiation To Fuel
Hazards Of Electromagnetic Radiation To Ordnance
Hazards Of Electromagnetic Radiation To People
HAZMAT
HCI
HDL
Header
Health Information
Health Information Portability And Accountability Act
Health Insurance Portability And Accountability Act
Health Level 7
Health Plan
Health Testing
Health, Education And Welfare
Healthcare Clearinghouse
Healthcare Provider
Heap
Heating, Ventilation, And Air Conditioning
HERF
HERO
HERP
Hertz
HEW
HF
HFS
HHS
Hierarchical File System
High Assurance Guard
High Assurance Internet Protocol Encryptor
High Assurance Internet Protocol Encryptor Interoperability Specification
High Availability
High Frequency
High Impact
High Performance Radio Local Area Network
High Speed
High Technology Crime Investigation Association
High-Impact System
High-Performance File System
High-Power Transmitter
HINFO
HIP
HIPAA
HIPERLAN
History File
Hj(i)
HKDF
Hkey_Local_Machine
HKLM
HL7
hLen
HMAC
HMAC-HASH
HMAC-hash(k, M)
HMAC-PRF
HMI
HoA
Holder-Of-Key Assertion
Home Address
Home Agent
Home Link
Homeland Security Presidential Directive
Honeypot
Hop Limit (IPv6 Field)
Hop-By-Hop Option Header (IPv6 extension header)
Host
Host Controller Interface
Host Identity Protocol
Host Information
Host Operating System
Host Protected Area
Host Vulnerability Scanners
Host-Based Firewall
Host-Based Intrusion Detection And Prevention System
Host-Based Security
Hosted Virtualization
Host-To-Gateway (IPsec protection model)
Host-To-Host (IPsec protection model)
Hot Site
Hotfix
Hotwash
HPA
HPFS
HR
HS
HSPD
HSPD-12
HTCIA
HTML
HTTP
HTTP Over SSL
HTTPS
Hub
Human Resources
Human-Computer Interaction
Human-Machine Interface
HVAC
Hybrid Cloud
Hybrid Control
Hybrid Entity
Hybrid Security Control
Hypertext Markup Language
Hypertext Transfer Protocol
Hypertext Transfer Protocol over SSL
HyperText Transfer Protocol over SSL/TLS
Hypertext Transfer Protocol over Transport Layer Security
Hypertext Transfer Protocol Secure
Hypervisor
Hypothesis (Null)
Hypothesis (Alternative)
Hz