A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

M

MAC

Media Access Control

Machine learning

A type of artificial intelligence (AI) that allows software applications to become more accurate in predicting outcomes without being explicitly programmed. The basic premise of machine learning is to build algorithms that can receive input data and use statistical analysis to predict an output value within an acceptable range.

Machine-in-the-middle (MITM)

A form of malicious activity where the attacker secretly accesses, relays and possibly alters the communication between two parties who believe they are communicating directly with each other.

Macro

An instruction that causes the execution of a predefined sequence of instructions.

Malicious

Intending or intended to do harm.

Malicious actors

Individual or organisations that conduct malicious activities, such as cyber espionage, cyber attacks or cyber-enabled crime.

Malicious advertising

The use of online advertising to spread malware. It typically involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and web pages.

Malicious code

Any software that attempts to subvert the confidentiality, integrity or availability of a system.

Malicious code infection

The occurrence of malicious code infecting a system.

Malicious email

An email which has been deliberately crafted to cause problems on the server or on the client. This could be by making the message contain a virus, or crafting the message in such a way as to take advantage of a weakness in the receiving mail client.

Malicious links

A malicious link is created with the purpose of promoting scams, attacks and frauds. By clicking on an infected URL, you can download malware such as a Trojan or virus that can take control of your devices, or you can be persuaded to provide sensitive information on a fake website.

Malicious software (malware)

Any software that brings harm to a computer system. Malware can be in the form of worms, viruses, Trojans, spyware, adware and rootkits etc which steal protected data, delete documents or add software not approved by a user.

Malvertising

The use of online advertising to spread malware. Malvertising involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.

Malware

Malicious software used to gain unauthorised access to computers, steal information and disrupt or disable networks. Types of malware include Trojans, viruses and worms.

Managed Service Provider (MSP)

A company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

Management traffic

Traffic generated by system administrators over a network in order to control workstations and servers. This includes standard management protocols and traffic that contains information relating to the management of the network.

Media

A generic term for hardware, often portable in nature, which is used to store data.

Media destruction

The process of physically damaging media with the intent of making data stored on it inaccessible. To destroy media effectively, only the actual material in which data is stored needs to be destroyed.

Media disposal

The process of relinquishing control of media when it is no longer required.

Media sanitisation

The process of erasing or overwriting data stored on media so that it cannot be retrieved or reconstructed.

Memory-safe programming languages

Programming languages that prevent the introduction of vulnerabilities related to memory use. Examples of memory-safe programming languages include C#, Go, Java, Ruby, Rust and Swift. Examples of non-memory-safe programming languages include Assembly and C/C++.

Metadata

Descriptive data about the content and context used to identify data.

MIMO

Multiple-input and multiple-output

Mobile base station

A transmission and reception station in a fixed location, consisting of one or more receive/transmit antenna, microwave dish and electronic circuitry, used to handle cellular traffic.

Mobile device

A portable computing or communications device. For example, smartphones, tablets and laptop computers.

Mobile phones

A wireless handheld device that allows users to make and receive phone calls and to send text messages, among other features.

Multi-factor authentication (MFA)

Authentication using two or more different authentication factors. This may include something users know, something users have or something users are.

Multifunction device (MFD)

IT equipment that combines printing, scanning, copying, faxing or voice messaging functionality in the one device. These devices are often designed to connect to computer and telephone networks simultaneously.

m

mSATA

Mini-Serial Advanced Technology Attachment