vocabularyM2N Flashcards

1
Q

MAC

A

Mandatory Access Control is a mandatory set of rules that everyone must abide by. It is a rule-based access control in which data owners are granted access based upon rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Macro Virus

A

A sequence of destructive instructions embedded into a common document such as a word processing or spreadsheet document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malicious Code

A

Any code that is intended to cause harm to a system or the data that it contains. Examples of malicious code are viruses and worms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Man-in-the-Middle Attack

A

A network attack where the hacker intercepts a public key exchange and substitutes his own public key for the requested one, thus enabling him to intercept messages from both sides of the communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mantrap

A

A double set of doors which create a small room in between. This type of physical access control is set up so that both sets of doors cannot be opened at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Maximum Tolerable Downtime

A

The maximum amount of time that a company and its resources can be down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Meet-in-the-Middle Attack

A

A type of attack that uses two simultaneous brute force attacks to encrypt a known plaintext with every possible key while decrypting the associated ciphertext with every possible key. This type of attack works with algorithms which use two rounds of encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mesh Topology

A

A LAN topology where every node is connected to every other node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Message Digest Algorithm

A

A hashing algorithm that uses four computation rounds to produce a 12-bit digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Military Attack

A

A type of attack that attempts to acquire secret information from military or law enforcement agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MMU

A

The memory management unit is a close component to the CPU. It translates addresses into a page frame address and processes requests for memory access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile Site

A

A data center alternative that is a trailer with appropriate environmental utilities. It can be configured as a cold or warm site and is easily moved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MOSS

A

MIME Object Security Services is a cryptography protocol that does not use CA digital certificates and can be a replacement for PEM. MOSS provides association between e-mail addresses and certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multipartite

A

A virus that uses multiple infection schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiprocessing

A

An environment that allows the execution of two or more processes on multiple CPUs at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multistate

A

An operating state in which the system is certified to handle information at multiple security levels at the same time. It is very expensive and a very difficult state to maintain. It requires specific protection mechanisms to prevent data from crossing security level boundaries.

17
Q

Multitasking

A

The process of executing two or more processes at a time on a single CPU by switching among processes, giving each one a finite time slice.

18
Q

Multithreading

A

The process of subdividing a process into two or more subprocesses or threads, and executing them at the same time on one or more CPUs. It may also be allowing multiple users to access the same shared process, each with its own local date space.

19
Q

Mutual Processing

A

An agreement between businesses to share data and software licensing before a disaster strikes. The companies work together and have a presence on each others machines.

20
Q

NAT

A

Network Address Translation is a conversion process between an intranet and public IP addresses. NAT provides secure access to the Internet, reducing the need for public IP addresses.

21
Q

Network

A

Multiple computers that are linked by cables or other communication paths and that have mutual software that allows them to communicate with each other.

22
Q

Network Intrusion

A

An attack in which there is unauthorized access to a protected resource.

23
Q

Network Layer

A

The layer of the ISO/OSI reference model that determines the best transport route to get data to its destination as well as message handling and transfer. This layer is concerned with actual movement of information from one device to another.

24
Q

Neural System

A

A knowledge-based system that is based on the building blocks of human cognition. A neural system starts with no knowledge and learns as it is used.

25
Q

NIACAP

A

The National Information Assurance Certification and Accreditation Process is a standard for certification and accreditation of computer systems generally pertaining to the United States Executive Branch.

26
Q

NIC

A

Network interface card is an expansion card or other device that provides the interface between the computer and network.

27
Q

NIST

A

The National Institute of Standards and Technology is a branch of the US Commerce Department. This organization works to develop standards for measurement, science, and technology.

28
Q

Non-Discretionary Control

A

A role-based access control in which access is granted based upon the subjects role instead of identity. This type of control is common in an environment with frequent personnel changes.

29
Q

Noninterference Model

A

A security model which ensures that actions on one security level have no effect on objects at another security level.

30
Q

Nonrepudiation

A

The process of assuring that a message came from who it says it came from.

31
Q

Nonvolatile Memory

A

Memory that maintains a value without power to the machine, such as secondary memory.

32
Q

NSA

A

The National Security Agency is an organization that is involved with developing standards ensuring that security is maintained and will work with both secure and non-secure systems.