Glossary H
- Hacker
- Handshake
- Hardening
- Harm
- Hashing
- Hash
- Hash Code
- Hash algorithm
- HMAC
- Hash Function
- Hash Output
- Hash Value
- Hashing
- Health Information
- HIPAA
- High Availability
- High Impact
- High Impact System
- Honeypot
- Host
- Host-based IDPS
- Host Based Firewall
- Host Operating System
- Hosted Virtualization
- Hot Site
- Hotfix
- HTTP
- Hybrid Cloud
- Hybrid Security Control
- HTTPS
- Hypervisor

Hash algorithm
A sequence of steps to execute a cryptographic hash function (see Cryptographic hash function). See NIST SP 800-106 for more information.
Hash Function
A function that maps a bit string of arbitrary length to a fixed length bit string and is expected to have the following three ...
Hash Output
The result ofapplying a hash function to a message. Also known as a “hash value” or “hashoutput”.See CNSSI4009-2015 under message digest (NIST SP 800-107 Rev. 1) for more ...
Hash Value
The result of applying a cryptographic hash function to data (e.g., a message). Also known as a “message digest”.See NISTSP 800-106 formore information.The fixed-length bitstring produced ...
Health Information
Any information, whether oral or recorded in any form or medium,that: Is created or received by a healthcare provider, health plan, public health authority, employer, ...
High Availability
HAA failover feature to ensure availability during device or component interruptions.See NIST SP 800-113 for more information.
High Impact
The loss of confidentiality, integrity, or availability that could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, individuals, ...
High Impact System
An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a FIPS Publication 199 potential impact value of ...
Host-based IDPS
Host-based Intrusion Detection and Prevention SystemA program that monitors the characteristics of a single host and the events occurring within that host to identify and ...
Host Based Firewall
Asoftware-based firewall installed on a server to monitor and control itsincoming and outgoing network traffic.See NISTSP 800-41 Rev. 1 for more information.
Host Operating System
The operating system kernel shared by multiple applications within an application virtualization architecture. See NIST SP 800-190 for more information. In a hosted virtualization solution, the OS that the ...
Hosted Virtualization
A form of full virtualization where the hypervisor runs on top of a host OS. See NIST SP 800-125 for more information.
Hybrid Cloud
The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together ...
Hybrid Security Control
A security control that is implemented in an information system in part as a common control and in part as a system-specific control. See the following under Hybrid Security Control for ...