Someone who gains unauthorised access to IT systems by bypassing their security
Wiki
The encyclopedia explains the major technical terms used to describe the technologies for the future markets of today, tomorrow and beyond. From A as in app to M as in MEMS right through to Z as in ZigBee.
HSM
Stand-alone devices, modules or cards in which cryptographic keys are generated and stored. They assure the integrity of data.
HTML
Hypertext Markup Language
Hybrid Cloud
Combination of private and public Cloud and traditional IT environment.