Media Access Control
Media Access Control
A type of artificial intelligence (AI) that allows software applications to become more accurate in predicting outcomes without being explicitly programmed. The basic premise of machine learning is to build algorithms that can receive input data and use statistical analysis to predict an output value within an acceptable range.
A form of malicious activity where the attacker secretly accesses, relays and possibly alters the communication between two parties who believe they are communicating directly with each other.
An instruction that causes the execution of a predefined sequence of instructions.
Intending or intended to do harm.
Individual or organisations that conduct malicious activities, such as cyber espionage, cyber attacks or cyber-enabled crime.
The use of online advertising to spread malware. It typically involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and web pages.
Any software that attempts to subvert the confidentiality, integrity or availability of a system.
The occurrence of malicious code infecting a system.
An email which has been deliberately crafted to cause problems on the server or on the client. This could be by making the message contain a virus, or crafting the message in such a way as to take advantage of a weakness in the receiving mail client.
A malicious link is created with the purpose of promoting scams, attacks and frauds. By clicking on an infected URL, you can download malware such as a Trojan or virus that can take control of your devices, or you can be persuaded to provide sensitive information on a fake website.
Any software that brings harm to a computer system. Malware can be in the form of worms, viruses, Trojans, spyware, adware and rootkits etc which steal protected data, delete documents or add software not approved by a user.
The use of online advertising to spread malware. Malvertising involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.
Malicious software used to gain unauthorised access to computers, steal information and disrupt or disable networks. Types of malware include Trojans, viruses and worms.
A company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.
Traffic generated by system administrators over a network in order to control workstations and servers. This includes standard management protocols and traffic that contains information relating to the management of the network.
A generic term for hardware, often portable in nature, which is used to store data.
The process of physically damaging media with the intent of making data stored on it inaccessible. To destroy media effectively, only the actual material in which data is stored needs to be destroyed.
The process of relinquishing control of media when it is no longer required.
The process of erasing or overwriting data stored on media so that it cannot be retrieved or reconstructed.
Programming languages that prevent the introduction of vulnerabilities related to memory use. Examples of memory-safe programming languages include C#, Go, Java, Ruby, Rust and Swift. Examples of non-memory-safe programming languages include Assembly and C/C++.
Descriptive data about the content and context used to identify data.
Multiple-input and multiple-output
A transmission and reception station in a fixed location, consisting of one or more receive/transmit antenna, microwave dish and electronic circuitry, used to handle cellular traffic.
A portable computing or communications device. For example, smartphones, tablets and laptop computers.
A wireless handheld device that allows users to make and receive phone calls and to send text messages, among other features.
Authentication using two or more different authentication factors. This may include something users know, something users have or something users are.
IT equipment that combines printing, scanning, copying, faxing or voice messaging functionality in the one device. These devices are often designed to connect to computer and telephone networks simultaneously.
Mini-Serial Advanced Technology Attachment