Ransomware Glossary (H)

  • Ransomware Glossary (H)

This glossary is from Learning Ransomware Response & Recovery by W. Curtis Preston and Dr. Mike Saylor. Browse all letters of the glossary or get the book.

Hardware Security Module (HSM) – A physical device that safeguards and manages cryptographic keys and performs encryption operations.

Hash Values – Unique digital fingerprints (like SHA256) used to verify file integrity and prove evidence hasn’t been tampered with.

Hash-based Scanning – Malware detection method that identifies files by their unique cryptographic signatures or fingerprints.

Heuristic Analysis – Malware detection method that identifies threats based on behavioral characteristics rather than known signatures.

Hidden Partitions – Storage areas not visible in standard disk management tools, such as recovery partitions, where malware can hide.

HIPAA (Health Insurance Portability and Accountability Act) – U.S. healthcare regulation requiring patient data protection and breach notifications.

Hot Site – A fully equipped disaster recovery facility that’s continuously synchronized with production and ready for immediate failover.

Hybrid Analysis – Cloud-based malware sandbox for automated behavioral analysis of suspicious files.

Hyper-V – Microsoft’s virtualization platform for creating isolated virtual machines.

Hypervisor – Software that creates and manages virtual machines; advanced malware can install itself as a hypervisor layer to control everything above it.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.