vocabularyM2N Flashcards
(32 cards)
MAC
Mandatory Access Control is a mandatory set of rules that everyone must abide by. It is a rule-based access control in which data owners are granted access based upon rules.
Macro Virus
A sequence of destructive instructions embedded into a common document such as a word processing or spreadsheet document.
Malicious Code
Any code that is intended to cause harm to a system or the data that it contains. Examples of malicious code are viruses and worms.
Man-in-the-Middle Attack
A network attack where the hacker intercepts a public key exchange and substitutes his own public key for the requested one, thus enabling him to intercept messages from both sides of the communication.
Mantrap
A double set of doors which create a small room in between. This type of physical access control is set up so that both sets of doors cannot be opened at the same time.
Maximum Tolerable Downtime
The maximum amount of time that a company and its resources can be down.
Meet-in-the-Middle Attack
A type of attack that uses two simultaneous brute force attacks to encrypt a known plaintext with every possible key while decrypting the associated ciphertext with every possible key. This type of attack works with algorithms which use two rounds of encryption.
Mesh Topology
A LAN topology where every node is connected to every other node.
Message Digest Algorithm
A hashing algorithm that uses four computation rounds to produce a 12-bit digest.
Military Attack
A type of attack that attempts to acquire secret information from military or law enforcement agencies.
MMU
The memory management unit is a close component to the CPU. It translates addresses into a page frame address and processes requests for memory access.
Mobile Site
A data center alternative that is a trailer with appropriate environmental utilities. It can be configured as a cold or warm site and is easily moved.
MOSS
MIME Object Security Services is a cryptography protocol that does not use CA digital certificates and can be a replacement for PEM. MOSS provides association between e-mail addresses and certificates.
Multipartite
A virus that uses multiple infection schemes.
Multiprocessing
An environment that allows the execution of two or more processes on multiple CPUs at the same time.
Multistate
An operating state in which the system is certified to handle information at multiple security levels at the same time. It is very expensive and a very difficult state to maintain. It requires specific protection mechanisms to prevent data from crossing security level boundaries.
Multitasking
The process of executing two or more processes at a time on a single CPU by switching among processes, giving each one a finite time slice.
Multithreading
The process of subdividing a process into two or more subprocesses or threads, and executing them at the same time on one or more CPUs. It may also be allowing multiple users to access the same shared process, each with its own local date space.
Mutual Processing
An agreement between businesses to share data and software licensing before a disaster strikes. The companies work together and have a presence on each others machines.
NAT
Network Address Translation is a conversion process between an intranet and public IP addresses. NAT provides secure access to the Internet, reducing the need for public IP addresses.
Network
Multiple computers that are linked by cables or other communication paths and that have mutual software that allows them to communicate with each other.
Network Intrusion
An attack in which there is unauthorized access to a protected resource.
Network Layer
The layer of the ISO/OSI reference model that determines the best transport route to get data to its destination as well as message handling and transfer. This layer is concerned with actual movement of information from one device to another.
Neural System
A knowledge-based system that is based on the building blocks of human cognition. A neural system starts with no knowledge and learns as it is used.