Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- machine learning"A general approach for determining models from data."
- Machine Learning and Evolution Definition: A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems.
- machine observation"Machine detection and interpretation of relevant and meaningful events and conditions that impact operation of the computer system itself or other dependent mechanisms or processes essential to the purpose of the system."
- Macro Virus Definition: A type of malicious code that attaches itself to documents and uses the macro programming capabilities of the document’s application to execute, replicate, and spread or propagate itself.Related Term(s): virus
- Main Frame Architecture A computer network design where large (main frame) computers maintain and process data and send information to users' terminals. In a classic mainframe set up, no processing occurs at the desktop, which is merely a means of viewing information contained in and processed on the main frame(...)
- malicious actor"See bad actor."
- Malicious Applet Definition: A small application program that is automatically downloaded and executed and that performs an unauthorized function on an information system.Related Term(s): malicious code
- Malicious Code Definition: Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system. Extended Definition: Includes software, firmware, and scripts.Related Term(s): malicious logic
- Malicious Logic Definition: Hardware, firmware, or software that is intentionally included or inserted in a system to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.Related Term(s): malicious code
- Malware Definition: Software that compromises the operation of a system by performing an unauthorized function or process.Synonym(s): malicious code, malicious applet, malicious logic
- materiality"Refers to the significance of a matter in relation to a set of financial or performance information. If a matter is material to the set of information, then it is likely to be of significance to a user of that information"
- McNamara fallacy"presum[ing] that (A) quantitative models of reality are always more accurate than other models; (B) the quantitative measurements that can be made most easily must be the most relevant; and (C) factors other than those currently being used in quantitative metrics must either not exist or not(...)
- measurability"ability to assess an attribute of an entity against a metric (note 1: "measurable" is the adjective form of "measurability")"
- measurement"(Quantitative) (1) act or process of assigning a number or category to an entity to describe an attribute of that entity; (2) assignment of numbers to objects in a systematic way to represent properties of the object; (3) use of a metric to assign a value (e.g., a number or category) from a(...)
- measurement method"generic description of a logical organization of operations used in a measurement"
- measurement model"The initial confirmatory factory analysis (CFA) model that underlies the structural model [that] tests the adequacy (as indexed by model fit) of the specified relations whereby indicators are linked to their underlying construct."
- Megabyte (Meg) A million bytes of data is a megabyte, or simply a meg.
- membership inference"given a machine learning model and a record, determining whether the record was used as part of the model's training dataset or not."
- Memory Card Memory cards, sometimes referred to as Flash Memory Cards, are removable solid-state storage devices employing flash memory technology. Some popular types of flash memory cards for use in digital cameras are: CompactFlash (CF), SmartMedia (SM), Memory Stick (MS), MultiMediaCard (MMC) Secure(...)
- Metadata Metadata is information about a particular data set which may describe, for example, how, when, and by whom it was received, created, accessed, and/or modified and how it is formatted. Some metadata, such as file dates and sizes, can easily be seen by users; other metadata can be hidden or(...)
- metric"defined measurement method and measurement scale"
- Migrated Data Migrated Data is information that has been moved from one database or format to another, usually as a result of a change from one hardware or software technology to another.
- minimization"(Part of the ICO framework for auditing AI) AI systems generally require large amounts of data. However, organisations must comply with the minimisation principle under data protection law if using personal data. This means ensuring that any personal data is adequate, relevant and limited to(...)
- Mirror Image Used in computer forensic investigations and some electronic discovery investigations, a mirror image is a bit-by-bit copy of a computer hard drive that ensures the operating system is not altered during the forensic examination. May also be referred to as “disc mirroring,” or as a “forensic(...)
- MIS Management information systems.