M Flashcards
MaaS
Monitoring as a Service
An IT service model that allows a third-party provider to monitor a company’s systems and networks. It’s a cloud-based framework that can be used to deploy monitoring functions for various applications and services in the cloud.
This monitors performance, availability, and security.
MAC (3)
Mandatory Access Control
Media Access Control
Message Authentication Code
Mandatory Access Control
A model of access control where the operating system provides users with access based on data confidentiality and user clearance levels. In this model, access is granted on a need-to-know basis: users must prove their need for information before gaining access.
This is ONE OF THE MOST SECURE access control models.
This model is non-discretionary, meaning that the owner of the file/folder does not have authority over who can access it.
Media Access Control
A network data transfer policy that determines how data transmits through a regular network cable.
It is responsible for moving data packets from one NIC to another, across a shared transmission medium. Physical addressing is handled at the MAC sublayer. MAC is also handled at this layer.
This protocol exists to ease data packets’ transfer between two computers and ensure no collision or simultaneous data transit occurs.
Message Authentication Code
AKA tag
A short piece of information appended to a message that is used for authenticating and integrity-checking the message. It also verifies that the message does not contain any harmful code. This is done via cryptography.
They can be stored on HSMs.
MAN
Metropolitan Area Network
Smaller than a WAN, but larger than a LAN.
A computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings.
MANs do not have to be in urban areas; the term “metropolitan” implies the size of the network, not the demographics of the area that it serves.
MBR
Master Boot Record
The information in the first sector of a hard disk or a removable drive. It identifies how and where the system’s OS is located in order to be booted (loaded) into the computer’s main storage or RAM.
MD5
Message Digest 5
A cryptographic hash function algorithm that takes the message as input of any length and changes it into a fixed-length message of 16 bytes.
The output of MD5 (Digest size) is always 128 bits.
MDF
Main Distribution Frame
The primary hub or demarcation point that interconnects private or public IT and telecommunication lines coming into a building to an internal network via any number of intermediate distribution frames (IDFs).
MDM
Mobile Device Management
A security software that lets your business implement policies to secure, monitor, and manage your end-user mobile devices.
MFA
Multifactor Authentication
A cybersecurity security solution that requires users to verify their identity using more than one method to log in to an account.
MFD
Multifunction Device
An MFD may act as a combination of some or all of the following devices: printer, copier, scanner, fax, and e-mail.
An office machine which incorporates the functionality of multiple devices in one and generally provides centralized document management/distribution/production in an office setting.
MFP
Multifunction Printer
A piece of office equipment that serves the primary purpose of copying and printing documents. They also scans, emails, faxes, browses the internet, and can print straight from the display panel, similar to a computer.
These machines pose a cybersecurity concern because they can contain sensitive data and are often connected to office networks without proper security protocols.
ML
Machine Learning
A branch of AI that uses algorithms trained on data sets to create models that help machines perform tasks that humans would normally do. These tasks can include analyzing data, categorizing images, or predicting price fluctuations.
MMS
Multimedia Message Service
The standard way of sending messages that include multimedia content, such as text, graphics, photos, audio, and video clips, to and from a mobile phone over a cellular network. MMS is built using the same technology as SMS (Short Message Service) but allows for more than just text.