INVITATION TO CYBERSECURITY 308 hash collision: different data objects having the same hash (7) hash dump: a file that contains password hashes (4) hash function: a cryptographic algorithm that takes as input a data object and outputs a hash (7) header: a prefix added to a packet that specifies delivery-related information (2) Health Insurance Portability and Accountability Act (HIPAA): a United States data privacy law that protects patient medical information (5) Heartbleed: a famous vulnerability in the OpenSSL software library that was discovered in 2014 (3) Hellman, Martin: a pioneering computer cryptographer who along with Whitfield Diffie discovered public key cryptography (7) Hello, World! program: the traditional first program written in a new language that outputs “Hello, World!” (2) hex editor: a program that can be used to view and edit the raw bytes of a file (2) hexadecimal: a base sixteen number system that uses the symbols 0-9 and a-f (2) hide-and-seek game: a game theory game that illustrates focal point biases and level-k reasoning (6) high-water mark principle: a principle of access control that states the highest level of information that a subject is exposed to sets the bar (8) HMAC (hashed message authentication code): the hash of a message that has been combined with a shared secret (7) hop: shorthand for a communication link (2) host OS: the base OS running on a computer (2) HTML (Hypertext Markup Language): the syntax for web pages (2) HTTP (Hypertext Transfer Protocol): the application layer network protocol web browsers and web servers use to communicate (2) HTTPS (Hypertext Transfer Protocol Secure): a secure form of HTTP that uses encryption and authentication (2) hypertext: formatted text that enables linking to URLs (2) Iceman: the hacker nick used by Max Butler, AKA Max Vision, the hacker whose story is told in Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen (3) identity and access management (IAM): software that is centralized and accessed over a network to provide authentication across an organization (8) identity theft: fraudulent actions taken in someone else’s name to obtain a financial benefit (5)
RkJQdWJsaXNoZXIy MTM4ODY=