Coming mid-July
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
October Special
Get 3 months of access for the price of 2!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer. Valid until October 31. Elevate your skills today!
Valid until October 31. Elevate your skills today!
Buy now
The glossary

Cybersecurity Glossary

Learn about Cybrary's impact initiatives where we focus on reducing industry-wide gatekeeping, improving security teams, and making a difference throughout the cybersecurity industry and beyond.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Letter for filtering (will be hidden in prod) :

H

High Impact System

A high impact system is an information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a fips 199 potential impact value of high. An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a potential impact value of high.

Letter for filtering (will be hidden in prod) :

H

Hybrid Security Control

Hybrid security control is a security control that is implemented in an information system in part as a common control and in part as a system-specific control.

Letter for filtering (will be hidden in prod) :

H

Hijack Attack

A hijack attack is a form of active wiretapping in which the attacker seizes control of a previously established communication association.

Letter for filtering (will be hidden in prod) :

H

Hypertext Markup Language (HTML)

Hypertext markup language (HTML) is a set of markup symbols or codes that are inserted in a file intended for display on a world wide web (www) browser page. This markup states to the browser how to display a web page to the user.

Letter for filtering (will be hidden in prod) :

H

Hardwired Key

A hardwired key is a permanently installed key.

Letter for filtering (will be hidden in prod) :

I

Internet Protocol (IP)

The internet protocol (IP) is a communication protocol that is used for relaying datagrams across network boundaries. It has a routing function which enables inter-networking, and essentially establishes the internet.

Letter for filtering (will be hidden in prod) :

I

Incremental Backups

An incremental backup provides a backup of only those files that have changed, modified, or are new since the last backup. Incremental backups are often desirable as they consume minimum storage and are quicker to perform than differential backups.

Letter for filtering (will be hidden in prod) :

I

IP Spoofing

IP spoofing is also known as IP address forgery or a host file hijack. It is a hijacking technique where a hacker impersonates a trusted host to conceal his identity, spoof a website, hijack browsers, or gain access to a network.

Letter for filtering (will be hidden in prod) :

I

Issue-Specific Policy

An issue-specific policy is intended to address specific needs within an organization, such as a password policy.

Letter for filtering (will be hidden in prod) :

I

Integrity

Integrity of a system or network is the assurance that information can only be accessed or modified by those who are authorized. Several measures are taken to ensure integrity. These include controlling the physical environment of networked terminals and servers, restricting access to data, and maintaining rigorous authentication practices. Data integrity can be threatened by environmental hazards, such as heat, dust, and electrical surges.