Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- Mitigation Definition: The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
- mixed methods"In mixed methods, the researcher collects and analyzes both qualitative and quantitative data rigorously in response to research questions and hypotheses; integrates the two forms of data and their results; organizes these procedures into specific research designs that provide the logic and(...)
- MLOPS"MLOps (machine learning operations) stands for the collection of techniques and tools for the deployment of ML models in production."
- model"A function that takes features as input and predicts labels as output."
- model assertion"Model assertions are arbitrary functions over a model’s input and output that indicate when errors may be occurring"
- model card"short documents accompanying trained machine learning models that provide benchmarked evaluation in a variety of conditions, such as across different cultural, demographic, or phenotypic groups (e.g., race, geographic location, sex, Fitzpatrick skin type) and intersectional groups (e.g., age(...)
- model debugging"Model debugging aims to diagnose a model’s failures."
- model decay"Model decay depicts that the performance of the model is degrading over time"
- model editing"An area of research that aims to enable fast, data-efficient updates to a pre-trained base model’s behavior for only a small region of the domain, without damaging model performance on other inputs of interest"
- model extraction"Adversaries maliciously exploiting the query interface to steal the model. More precisely, in a model extraction attack, a good approximation of a sensitive or proprietary model held by the server is extracted (i.e. learned) by a dishonest user who interacts with the server only via the query(...)
- model governance"Model Governance is the name for the overall internal framework of a firm or organization that controls the processes for Model Development, Model Validation and Model Usage, assign responsibilities and roles etc."
- model inventory"in the context of Risk Management, [...] a database/[management information system] developed for the purpose of aggregating quantitative model related information that is in use by a firm or organization."
- model overlay"Judgmental or qualitative adjustments to model inputs or outputs to compensate for model, data, or other known limitations. A model overlay is a type of override."
- model risk management"model risk management encompasses governance and control mechanisms such as board and senior management oversight, policies and procedures, controls and compliance, and an appropriate incentive and organizational structure"
- model suite"A group of models that work together."
- model training"the phase in the data science development lifecycle where practitioners try to fit the best combination of weights and bias to a machine learning algorithm to minimize a loss function over the prediction range"
- model validation"the set of processes and activities intended to verify that models are performing as expected."
- Modem A piece of hardware that lets a computer talk to another computer over a phone line.
- monitoring"Examination of the status of the activities of a supplier and of their results by the acquirer or a third party."
- moral agency"The capacity for moral action, reasoning, judgment, and decision making, as opposed to merely having moral consequences."
- moral patiency"The moral standing of an entity in the sense of how that entity should be treated."
- Mount/Mounting The process of making off-line data available for on-line processing. For example, placing a magnetic tape in a drive and setting up the software to recognize or read that tape. The terms “load” and “loading” are often used in conjunction with, or synonymously with, “mount” and “mounting” (as(...)
- Moving Target Defense Definition: The presentation of a dynamic attack surface, increasing an adversary's work factor necessary to probe, attack, or maintain presence in a cyber target.