A robot reads a scroll

Cybersecurity
Terms & Definitions

Understanding security terminology helps you make informed decisions about protecting your organization. This glossary defines essential security terms for managed services and enterprise protection.

M

MAC Address
Plus icon.

A unique hardware identifier permanently assigned to network interface cards by manufacturers. MAC addresses enable device identification on local networks, though attackers can spoof them to bypass basic access controls.

Machine learning
Plus icon.

Computer algorithms that improve performance through data analysis without explicit programming for each scenario. In cybersecurity, machine learning detects anomalies and identifies threats by recognizing patterns in vast datasets.

Macro virus
Plus icon.

Malicious code embedded in document macros that executes when users open infected files. Macro viruses spread through email attachments and shared documents, exploiting office application automation features.

Malicious applet
Plus icon.

Small programs automatically downloaded and executed in web browsers or applications that perform unauthorized actions. Malicious applets exploit browser vulnerabilities to install malware or steal data without user knowledge.

Malicious code
Plus icon.

Software, firmware, or scripts intentionally designed to damage systems, steal data, or disrupt operations. Malicious code includes viruses, worms, Trojans, ransomware, and spyware that compromise confidentiality, integrity, or availability.

Managed Service Provider (MSP)
Plus icon.

Companies that remotely manage clients' IT infrastructure, security, and end-user systems under subscription agreements. MSPs provide ongoing maintenance, monitoring, and support, allowing organizations to outsource technology management.

Mandatory Access Control (MAC)
Plus icon.

Security model where the system enforces access decisions based on classification labels assigned to users and resources. Users cannot change MAC permissions, ensuring consistent policy enforcement across the organization.

Man-in-the-Middle Attack (MitM)
Plus icon.

An attack where adversaries secretly intercept and potentially modify communications between two parties who believe they're communicating directly. MitM attacks compromise encryption, steal credentials, and enable eavesdropping on sensitive conversations.

Masquerade Attack
Plus icon.

An intrusion where attackers impersonate legitimate users or systems to gain unauthorized access. Masquerade attacks exploit stolen credentials or spoofed identities to bypass authentication controls.

MD5
Plus icon.

A cryptographic hash function producing 128-bit values from input data. MD5 is now considered insecure due to collision vulnerabilities and should be replaced with stronger algorithms like SHA-256.

Measures of Effectiveness (MOE)
Plus icon.

Probability models evaluating the likely impact of security actions within specific environments. MOE helps organizations assess whether defensive measures achieve intended protection objectives.

Microsegmentation
Plus icon.

Network security strategy creating isolated zones within data centers and cloud environments to limit lateral movement. Microsegmentation applies granular policies restricting traffic between workloads based on Zero Trust principles.

Mitigation
Plus icon.

Actions taken to reduce the likelihood or impact of security risks through implementing appropriate controls. Mitigation prioritizes threats based on risk assessments and available resources for remediation.

Mobile Device Management (MDM)
Plus icon.

Software platforms managing, monitoring, and securing employee mobile devices accessing corporate resources. MDM enforces security policies, deploys applications, and enables remote data wiping for lost or stolen devices.

Monoculture
Plus icon.

The widespread use of identical software, operating systems, or configurations across many systems. Monocultures amplify attack impact since vulnerabilities affecting one system compromise all similarly configured systems.

Morris Worm
Plus icon.

A 1988 worm program that spread across ARPANET, disrupting thousands of hosts and demonstrating the vulnerability of networked systems. The Morris Worm highlighted the need for coordinated incident response.

Moving target defense
Plus icon.

Security strategy continuously changing attack surfaces to increase adversary effort required for reconnaissance and exploitation. Moving target defenses randomize configurations, addresses, or system properties to complicate attacks.

Multi-Cast
Plus icon.

Network transmission method sending data from one source to multiple specific recipients simultaneously. Multicast efficiently distributes content to groups without consuming bandwidth for individual connections.

Multi-cloud
Plus icon.

Using multiple cloud service providers like AWS, Azure, and Google Cloud within a single architecture. Multi-cloud strategies avoid vendor lock-in but require consistent security policies across diverse platforms.

Multi-Factor Authentication (MFA)
Plus icon.

Authentication requiring two or more independent verification methods such as passwords, tokens, biometrics, or one-time codes. MFA significantly reduces credential theft risks by requiring attackers to compromise multiple factors.

Multi-Homed
Plus icon.

Network configurations connecting directly to two or more Internet service providers. Multi-homing provides redundancy and load balancing but requires careful routing configuration to prevent security gaps.

Multiplexing
Plus icon.

Combining multiple signals from different sources for transmission over a single communication channel. Multiplexing increases bandwidth efficiency but requires proper segmentation to prevent cross-contamination of data streams.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

By submitting this form, you are agreeing to receive additional communications from MCK Network Solutions. You can opt out at any time. Please review our Privacy Policy for additional information about how MCK Network Solutions protects your privacy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.