A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

H

Hack

The unauthorised exploitation of weaknesses in a computer system or network.

Hacker

A computer expert that can gain unauthorised access to computer systems. Hacker is an agnostic term and a hacker does not necessarily have malicious intent. See also ‘black hat’, ‘grey hat’, and ‘white hat’.

Hacktivist

A hacker whose motivation is political, religious or ideological, as opposed to criminal.

Hardware

A generic term for IT equipment and OT equipment.

Hardware Security Module (HSM)

A physical computing device that safeguards cryptographic keys and provides cryptographic processing. A hardware security module is or contains a cryptographic module. Hardware security modules are commonly deployed in public key infrastructure, digital identity solutions and payment systems.

Hardware vulnerabilities

An exploitable weakness in a computer system that enables attacks through remote or physical access to system hardware.

Hash-based Message Authentication Code Algorithm (HMAC)

A cryptographic function that can be used to compute Message Authentication Codes using a hash function and a secret key.

High Assurance Cryptographic Equipment (HACE)

Cryptographic equipment that has been authorised by ASD for the protection of SECRET and TOP SECRET data.

High Assurance evaluation

The rigorous investigation, analysis, verification and validation of ICT equipment by the Australian Signals Directorate (ASD) against a stringent security standard.

High Assurance Evaluation Program

The rigorous investigation, analysis, verification and validation of products by ASD to protect SECRET and TOP SECRET data.

High assurance IT equipment

IT equipment that has been designed and authorised for the protection of SECRET and TOP SECRET data.

High-value server

A server that provides important network services or contains data repositories. For example, a Domain Name System server, database server, email server, file server or web server.

HIPS

Host-based Intrusion Prevention System

Hoax

A falsehood deliberately fabricated to masquerade as the truth.

Hoax emails

A scam that is distributed in email form that is designed to deceive and defraud email recipients, often for monetary gain.

Honeypot

A computer system designed specifically to attract potential malicious actors in order to inform the development of defensive measures and responses.

Hotspot

An area where wireless internet access is available to the general public.

HTML

Hypertext Markup Language

HTTP Strict Transport Security (HSTS)

A web security policy mechanism that helps to protect websites against person-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking.

Hybrid hard drive (HHD)

Non-volatile magnetic media that uses a cache to increase read/write speeds and reduce boot times. The cache is normally non-volatile flash memory media.

Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol is the fundamental protocol used for transferring files on the internet.

Hypertext Transfer Protocol Secure (HTTPS)

While Hypertext Transfer Protocol (HTTP) is the basic framework for transferring data across the web, HTTPS adds a layer of encryption for additional security; with 'S' standing for secure.