Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

H

Host

A network host is a computer or other device connected to a computer network. A network host is a network node that is assigned a network layer host address. A network host may offer information resources, services, and applications to users or other nodes on the network.

Letter for filtering (will be hidden in prod) :

H

Honeypot

Honeypot is a computer security program that simulates one or more network services that you define on your computer’s ports. An attacker may assume that you’re running weak services that can be used to break into the machine. A honeypot provides you advanced warning of a more concerted attack. Two or more honeypots on a network form a honeynet.

Letter for filtering (will be hidden in prod) :

H

Hacker

A hacker is a term used for an expert computer programmer who tries to gain unauthorized access into a network or computer systems with intent.

Letter for filtering (will be hidden in prod) :

H

Honeymonkey

A honeymonkey is an automated program that imitates a human user to detect and identify websites which exploit vulnerabilities on the internet. It is also known as a honey client.

Letter for filtering (will be hidden in prod) :

H

Hyperlink

A hyperlink (usually highlighted by color or underscoring) could be a word, a phrase, or an image that refers to data or related information that the user can directly follow either by clicking or by hovering. A hyperlink points to a whole document or to a specific element within a document while a hypertext is text with hyperlinks.

Letter for filtering (will be hidden in prod) :

H

Hard Copy Key

A hard copy key is physical keying material, such as printed key lists, punched or printed key tapes, or programmable, read-only memories.

Letter for filtering (will be hidden in prod) :

H

Hash Value

A hash value is the result of applying a cryptographic hash function to data (e.g., a message).

Letter for filtering (will be hidden in prod) :

H

Hybrid Encryption

Hybrid encryption is a method of encryption that combines two or more encryption algorithms or systems. This method merges asymmetric and symmetric encryption in order to derive benefit from the strengths of each form of encryption. These strengths include speed and security respectively.

Letter for filtering (will be hidden in prod) :

H

Hop

A hop occurs each time that a data packet is passed from one device (source) to the next device (destination). Data packets pass through bridges, routers, and gateways on the way.

Letter for filtering (will be hidden in prod) :

H

Handshaking Procedures

Handshaking procedures are the dialogue between two information systems for synchronizing, identifying, and authenticating themselves to one another.