Hash
A Hash or hash function is a function that can be used to transform digital data of an arbitrary size to digital data of a fixed size. The values returned by a hash function are called hash values, hash codes, hash sums, or most commonly, hashes. A cryptographic hash function takes input data, like an address or a credit card number, and transforms it into a compact string of seemingly random characters that generally renders the data useless in the event of a breach.
Healthcare Fraud
Healthcare fraud is a type of white-collar crime that involves the filing of dishonest health care claims in order to turn a profit. Fraudulent health care schemes come in many forms, such as individuals obtaining subsidized or fully-covered prescription pills that are actually unneeded and then selling them on the black market for a profit, or billing by practitioners for care that they never rendered and filing duplicate claims for the same service rendered.
High-Risk Industry
A high-risk industry describes when a type of business proves to have higher rates of failure than others. If businesses in a certain sector, like beer production, have higher rates of failure over other business types, then beer production would be considered a "high-risk industry".
Honeypot
A Honeypot is decoy computer system designed to identify and/or trap hackers and other malicious actors. A honeypot sometimes offers a tempting set of data to attract fraudsters and counteracts their attempts to hack into or otherwise compromise an information system. A honeypot acts as bait by appearing to be a legitimate part of a website, database, or computer system, but is being monitored by IT and security professionals seeking insights into new methods of attack.
Hospitality
Hospitality is a term used to describe how well a certain location or entity accommodates somebody. If a person is well accommodated for when they visit somewhere, it would likely be said that that place provided good hospitality.
Host Card Emulation
In device technology, host card emulation is the software architecture that provides exact virtual representation of various electronic identity (access, transit and banking) cards using only software. Prior to the HCE architecture, near field communication (NFC) transactions were mainly carried out using secure elements. HCE enables mobile applications running on supported operating systems to offer payment card and access card solutions independently of third parties while leveraging cryptographic processes traditionally used by hardware-based secure elements without the need for a physical secure element.
Hybrid Detection System
A hybrid intrusion detection system is used to provide increased detection capabilities. HNID integrates a neural network detection component with a basic pattern matching engine to detect anomalies in the network traffic. This approach efficiently detects known classes of attacks, and also the unknown ones. Both of the detection solutions run simultaneously so that one can provide a method to filter and group the security alerts to reduce the number of alerts which will be sent to the network administrator.