Cyber Security Glossary
Find definitions for IT security and compliance in our online glossary of key terms, acronyms, and vocabulary.
-
TermDefinition
- measurement method"generic description of a logical organization of operations used in a measurement"
- measurement model"The initial confirmatory factory analysis (CFA) model that underlies the structural model [that] tests the adequacy (as indexed by model fit) of the specified relations whereby indicators are linked to their underlying construct."
- Megabyte (Meg) A million bytes of data is a megabyte, or simply a meg.
- membership inference"given a machine learning model and a record, determining whether the record was used as part of the model's training dataset or not."
- Memory Card Memory cards, sometimes referred to as Flash Memory Cards, are removable solid-state storage devices employing flash memory technology. Some popular types of flash memory cards for use in digital cameras are: CompactFlash (CF), SmartMedia (SM), Memory Stick (MS), MultiMediaCard (MMC) Secure(...)
- Metadata Metadata is information about a particular data set which may describe, for example, how, when, and by whom it was received, created, accessed, and/or modified and how it is formatted. Some metadata, such as file dates and sizes, can easily be seen by users; other metadata can be hidden or(...)
- metric"defined measurement method and measurement scale"
- Migrated Data Migrated Data is information that has been moved from one database or format to another, usually as a result of a change from one hardware or software technology to another.
- minimization"(Part of the ICO framework for auditing AI) AI systems generally require large amounts of data. However, organisations must comply with the minimisation principle under data protection law if using personal data. This means ensuring that any personal data is adequate, relevant and limited to(...)
- Mirror Image Used in computer forensic investigations and some electronic discovery investigations, a mirror image is a bit-by-bit copy of a computer hard drive that ensures the operating system is not altered during the forensic examination. May also be referred to as “disc mirroring,” or as a “forensic(...)
- MIS Management information systems.
- Mitigation Definition: The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
- mixed methods"In mixed methods, the researcher collects and analyzes both qualitative and quantitative data rigorously in response to research questions and hypotheses; integrates the two forms of data and their results; organizes these procedures into specific research designs that provide the logic and(...)
- MLOPS"MLOps (machine learning operations) stands for the collection of techniques and tools for the deployment of ML models in production."
- model"A function that takes features as input and predicts labels as output."
- model assertion"Model assertions are arbitrary functions over a model’s input and output that indicate when errors may be occurring"
- model card"short documents accompanying trained machine learning models that provide benchmarked evaluation in a variety of conditions, such as across different cultural, demographic, or phenotypic groups (e.g., race, geographic location, sex, Fitzpatrick skin type) and intersectional groups (e.g., age(...)
- model debugging"Model debugging aims to diagnose a model’s failures."
- model decay"Model decay depicts that the performance of the model is degrading over time"
- model editing"An area of research that aims to enable fast, data-efficient updates to a pre-trained base model’s behavior for only a small region of the domain, without damaging model performance on other inputs of interest"
- model extraction"Adversaries maliciously exploiting the query interface to steal the model. More precisely, in a model extraction attack, a good approximation of a sensitive or proprietary model held by the server is extracted (i.e. learned) by a dishonest user who interacts with the server only via the query(...)
- model governance"Model Governance is the name for the overall internal framework of a firm or organization that controls the processes for Model Development, Model Validation and Model Usage, assign responsibilities and roles etc."
- model inventory"in the context of Risk Management, [...] a database/[management information system] developed for the purpose of aggregating quantitative model related information that is in use by a firm or organization."
- model overlay"Judgmental or qualitative adjustments to model inputs or outputs to compensate for model, data, or other known limitations. A model overlay is a type of override."
- model risk management"model risk management encompasses governance and control mechanisms such as board and senior management oversight, policies and procedures, controls and compliance, and an appropriate incentive and organizational structure"