JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
H
H
Ha Ha Only Serious
Hack
Hack Attack
Hack Mode
Hack On
Hack Together
Hack Up
Hack Value
Hacked Off
Hacked Up
Hacker
Hacker code of ethics
Hacker Ethic, The
Hacker vulnerability testing tools
Hackers (and Unauthorized Users)
Hacking
Hacking root
Hacking Run
Hacking X For Y
Hackintosh
Hackish
Hackishness
Hackitude
Hacktivism
Hair
Hairball
Hairy
HAKMEM
Hakspek
Half-Duplex Operation
Halftone
Halftone Characteristic
hallenge-Handshake Authentication Protocol (CHAP)
Hammer
Hamming Code
Hamming Distance
Hamming Weight
Hamster
Hand Cruft
Hand geometry scanning
Hand-Hacking
Handle
Handled
Handled By
Handler
Handling Caveats
Handling Restrictions
Hand-Roll
Handshaking
Handshaking Procedure
Handshaking Procedures
Hand-shaking stages
Handwave
Hang
Hanlon's Razor
Happily
Haque
Hard Boot
Hard Copy
Hard Copy Key
Hardcoded
Harden
Hardening
Hardware
Hardware Asset Management
Hardware Handshaking
Hardware Isolation Mechanisms
Hardware Protection Mechanisms
Hardware Security
Hardwarily
Hardwire
Hardwired
Hardwired Key
Has The X Nature
Hash
Hash Bucket
Hash Collision
Hash Total
Hashed Message Authentication Code
Hashing
Hashword
Hat
Hazard
HCF
HD
HDLC
HDM
Header
Header checksum
Header destruction
Header length
Head-On Collision
Heads Down
Health Information Portability and Accountability Act (HIPAA[AuQ3][AuQ3])
Heartbeat
Heatseeker
Heavy Metal
Heavy Wizardry
Heavyweight
Heisenbug
Hello, Sailor!
Hello, Wall!
Hello, World
Hertz
Heuristic
Hex
Hexadecimal
Hexadecimal directory traversal attack
Hexit
HF
HHOK
HHOS
Hidden Flag
Hidden Sections
Hierarchical
Hierarchical Computer Network
Hierarchical Development Methodology (HDM)
Hierarchically Synchronized Network
High Bit
High Moby
High Order Language
High Risk Environment
High-Level Control
High-Level Data Link Control
High-Level Language
Highly
Hing
HIPAA (Health Information Portability and Accountability Act)
Hirsute
History Of Information Security
HLL
HMAC
HMAC (key-Hashed Message Authentication Code)
Hobbit
Hog
HOIS
HOIST
HOL
Hole
Holy Wars
Home Box
Home Machine
Home page
Homeland Security Act of 2002
Hook
Hop
Hose
Hosed
Host
Host assessment tools
Host Computer
Host firewall
Host IDS
Host part
Host To Front-End
Host To Front-End Protocol
Hostile Code
Hostile Cognizant Agent
Hostile Intelligence Sources
Hostile Threat Environment
Hosting companies
Hot site
Hot Spot
Hot-Standby
House Wizard
Housekeeping Procedures
HP-SUX
HSM
HTML (Hypertext Markup Language)
HTML body parts
HTTP (Hypertext Transfer Protocol)
HTTP proxy server
Https
Huff
Human Intelligence
Human Interface Functions
Human Source
Human Threats
HUMINT
Humma
Humor, Hacker
Hung
Hungry Puppy
Hungus
HUS
HUSK
Hybrid attacks
Hybrid Computer
Hybrid TCP/IP-OSI architecture
Hyperspace
Hypertext Markup Language (HTML)
Hypertext Transfer Protocol (HTTP)
Hysterical Reasons
Hz
Hidden Flag
An extra option added to a routine without changing the calling sequence. For example, instead of adding an explicit input variable to instruct a routine to give extra diagnostic output, the programmer might just add a test for some otherwise meaningless feature of the existing inputs, such as a negative mass. The use of hidden flags can make a program very hard to debug and understand, but is all too common wherever programs are hacked on in a hurry.