KMN Flashcards
Key goal indicator (KGI)
A measure that tells management, after the fact, whether an IT process has achieved its business requirements; usually expressed in terms of information criteria.
Key performance indicator (KPI)
A performance indicator or key performance indicator is a type of performance measurement
Key risk indicator (KRI)
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk
Mail relay server
An electronic mail (e-mail) server that relays messages so that neither the sender nor the recipient is a local user.
Malware
Short for malicious software. Designed to infiltrate, damage or obtain information from a computer system without the owner’s consent. Examples of malware include computer viruses, worms, Trojan horses, spyware and adware.
Mandatory access control (MAC)
Logical access control filters used to validate access credentials that cannot be controlled or modified by normal users or data owners
Man-in-the-middle attack (MITM)
An attack strategy in which the attacker intercepts the communication stream between two parts of the victim system and then replaces the traffic between the two components with the intruder’s own, eventually assuming control of the communication
Masqueraders
Attackers that penetrate systems by using the identity of legitimate users and their logon credentials
Maximum tolerable outages (MTO)
Maximum time that an enterprise can support processing in alternate mode
Media access control (MAC)
Lower sublayer of the OSI Model Data Link layer
Message authentication code
An American National Standards Institute (ANSI) standard checksum that is computed using Data Encryption Standard (DES).
Message digest
A cryptographic hash function takes an input of an arbitrary length and produces an output (also known as a message digest) that is a standard-sized binary string. The output is unique to the input in such a way that even
a minor change to the input results in a completely different output. Modern cryptographic hash functions are
also resistant to collisions (situations in which different inputs produce identical output); a collision, while possible, is statistically improbable. Cryptographic hash functions are developed so that input cannot be determined readily from the output. See Hash.
Mirrored site
An alternate site that contains the same information as the original
Mobile site
The use of a mobile/temporary facility to serve as a business resumption location. The facility can usually be delivered to any site and can house information technology and staff.
Monitoring policy
Rules outlining or delineating the way in which information about the use of computers, networks, applications and information is captured and interpreted