H
hacker

Generally used to refer to someone who gains access to a system, software, or hardware without permission. Also can be called a cracker.

handshake

The process of agreeing to communicate and share data. TCP uses a three-way handshake to establish connections, and part of this process can be exploited by certain types of attacks.

hardening

The process of making an entity, usually an operating system, more secure by closing known holes and addressing known security issues.

hash/hashing

The process of transforming characters into other characters that represent (but are not) the originals. Traditionally, the results are smaller and more secure than the original.

hash value

A single number used to represent an original piece of ...

Get CompTIA Security+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.