Archives: Glossary Terms

Malvertising 

Online advertising used to spread malware.

Read More

Malware 

Software designed to disrupt, damage, or intrude into a computer. Examples are viruses, dishonest adware, spyware, worms, Trojans, crimeware, and scareware.

Read More

Man trap

A physical security access control device consisting of an enclosed hallway with interlocking doors on each end where both doors can’t be open at the same time.

Read More

man-in-the-middle attack 

Active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them. The victims thus believe they are communicating directly with one another, but in...

Read More

MASINT) Measurement and signature intelligence

Information produced by quantitative and qualitative analysis of physical attributes of targets and events to characterize, locate, and identify targets and events, and derived from specialized, technically derived measurements of...

Read More

Metasploit framework

An open-source tool for developing and executing exploit code against a remote target machine.

Read More

MFA prompt bombing 

The practice of sending a high volume of spamming multifactor authentication (MFA) login attempts to an account until the account’s owner accepts the MFA prompt out of desperation, wishing to...

Read More

MICE 

A mnemonic device used in counterintelligence training to remind trainees of the four general motivations that could lead someone to commit treason, become an insider threat, or collaborate with a...

Read More

Microsegmentation

A zero-trust security technique that isolates application workloads from one another in a way that allows each to be protected individually.

Read More

Mitigation 

Reducing risks or effects. In the context of cyber security, reducing the risk or effect of a cyber attack.

Read More