What Are Hosts in Cybersecurity? (Complete Guide)