Glossary of Cyber Security Terms

Essential Vocabulary for Navigating the World of Cyber Security

M

MAC Address

A MAC Address is like a unique fingerprint for network devices, a distinct numeric value that distinguishes one device from every other device globally.

Malicious Code

Malicious code, akin to a digital Trojan horse, is deceptive software that seems useful but instead allows unauthorized system access or deceives a user into running other malevolent logic.

Malware

Malware is an umbrella term, encompassing different types of harmful code aimed at compromising digital systems, such as viruses, trojans, ransomware, and spyware.

Mandatory Access Control (MAC)

MAC is a security bouncer for systems, controlling access based on assigned classification levels to both the objects and users. It's a non-negotiable control that no user can alter.

Man-in-the-Middle Attack

In a man-in-the-middle attack, the attacker surreptitiously intercepts and potentially alters communication between two parties who believe they're communicating directly with each other.

Masquerade Attack

Masquerade attacks involve an entity illegitimately assuming the identity of another system entity, like a digital impersonator or con artist.

md5

md5 is a cryptographic one-way street. It's a hash function that transforms input into a unique output, playing a key role in maintaining data integrity and security. See also: "hash functions" and "sha1."

Measures of Effectiveness (MOE)

MOE is a probability model based on engineering concepts, approximating the impact of a particular action in an environment. In the context of information warfare, MOE represents the capacity to attack or defend within an internet environment.

Microkernel

A microkernel is the smallest software package capable of providing the necessary mechanisms to implement an operating system. It's like the heart of the software, driving the functions needed to operate your system.

Mobile Code

Mobile code is like a universal translator. It's a piece of software that can be transported unchanged across different platforms, executing with the same semantics regardless of where it's running.

Monoculture

Monoculture in cybersecurity refers to a situation where a large number of users utilize the same software, making them vulnerable to the same set of attacks. It's like planting only one type of crop, increasing susceptibility to specific pests or diseases.

Morris Worm

The Morris Worm was a notorious worm program crafted by Robert T. Morris, Jr., which inundated the ARPANET in November 1988 and caused issues for thousands of hosts.

Multi-Cast

Multi-cast is like a private radio broadcast from one host to a select set of hosts, transmitting data to a targeted group rather than all users on a network.

Multi-Factor Authentication

Multi-factor authentication is a digital security guard, confirming a user's claimed identity by using at least two different verification methods: something they know, something they possess, or something they inherently are.

Multi-Homed

Being "multi-homed" is like having multiple internet connections. It means your network is directly connected to more than one Internet Service Provider (ISP), adding redundancy and potentially improving network reliability.

Multiplexing

Multiplexing is the digital equivalent of a merge in traffic, combining multiple signals from various sources to transmit them over a single pathway.

Mutual Authentication

Mutual Authentication is a digital handshake between a client and server, ensuring both parties verify each other's identities before proceeding with any transactions.