HACE. High Assurance Cryptographic Equipment. An IT device driven by cryptographic algorithms that is used by organisations to protect highly classified data.
HIDS. Host-based Intrusion Detection System. A cybersecurity protection system that monitors the internal environment of computer networks for unusual system behaviour and suspicious activities, which include hostile intrusions by external threat actors and internal misconfiguration or misuse of IT resources.
HIPAA. Health Insurance Portability Accountability Act. A U.S. law that — among other things — helps set the standards for the storage and privacy of an individual’s medical data.
HIPS. Host-based Intrusion Prevention System. A cybersecurity protection system that extends the functions of HIDS to include active reponse to counter or mitigate a detected threat.
HKCR. HKEY_CLASSES_ROOT (Windows registry hive). A root key in the Windows Registry database that contains information about registered applications.
HKCU. HKEY_CURRENT_USER (Windows registry hive). A root key in the Windows Registry database that contains user-specific configuration data.
HKEY. Hive Key. A naming convention element used for designating root keys in Windows’ hierarchical registry database. Rendered as HK when used in acronyms referring to specific registry hives such as HKU and HKCR.
HKLM. HKEY_LOCAL_MACHINE (Windows registry hive). A root key in the Windows Registry database that contains local machine-specific configuration data.
HKU. HKEY_USERS (Windows registry hive). A root key in the Windows Registry database that contains subkeys for each user profile actively loaded on the machine.
HMAC. Hashed Message Authentication Code, or Hash-based Message Authentication Code. A type of message authentication code (MAC) that uses a hash function and a secret cryptographic key. During a server-client interaction, HMAC generates a unique private key known only to the specific server and specific client involved in the interaction.
HPP. HTTP Parameter Pollution. A web-based attack method that exploits vulnerabilities in the HTTP protocol, allowing a threat actor to inject malicious code and scripts within an HTTP request, for the purpose of bypassing access validation checkpoints and security mechanisms; manipulating input data; retrieving hidden information; and executing other malicious processes.
HSTS. Hypertext Transfer Protocol Strict Transport Security. A web security standard that, once enabled, restricts access between user browsers and websites to be limited only to secure connections (i.e., HTTPS). This mechanism protects both websites and users from cookie hijacking attacks, man-in-the-middle attacks, and other malicious activities.
HTTP. Hypertext Transfer Protocol. The communications protocol used mostly by web browsers to connect to servers on a local network; or to websites, applications, and other resources on the Internet. The core function of HTTP is to provide a standard method for computers to communicate with each other. As such, it serves as a foundational element of the World Wide Web, enabling users and devices to exchange data, load webpages, and perform other processes.
HTTPS. Hypertext Transfer Protocol Secure. The secure version of HTTP that uses encryption and signatures to authenticate messages (i.e., requests and responses) between client browsers and web/networked servers.
1300 667 871 or +61 7 3220 0352
Level 5, 488 Queen Street, Brisbane, QLD 4000
Level 21, 133 Castlereigh Street, Sydney, NSW 2000
Level 28, 303 Collins Street, Melbourne, VIC 3000