The FREE Cybersecurity Glossary by Thor Pedersen!

Use my glossary to help in your CISSP, CISM, CC, Cybersecurity certification studying.

- Microwave transmission
Microwave transmission: A wireless communication technology that uses high-frequency radio waves to transmit data. It is typically used for point-to-point communication links, such as connecting two locations or serving as a backbone for cellular networks. Because microwave signals require a direct line of sight, security measures are essential to prevent interception or interference.
- Middleware
Middleware: A layer of software that facilitates communication and data management between different applications or components within a system. This software 'glue' enables interaction between disparate systems, acting as a bridge across different databases, networks, operating systems, or programming languages. In a secure environment, middleware must be properly configured and updated to prevent it from becoming a potential vulnerability or entry point for unauthorized access.
- Milestone
Milestone: A significant event or a point in time that marks a notable achievement or progress. For instance, in a security system implementation, a milestone might be the successful installation and testing of a new firewall. These markers aid in the overall management and tracking of project progress, ensuring that each component contributes effectively to the overall security posture of an organization.
- Miniature Fragment Attack
Miniature Fragment Attack: A miniature fragment attack is a network-based attack where small fragments of a malicious packet are sent across the network to evade detection by intrusion detection and prevention systems that may not properly reassemble fragmented traffic. This technique can allow attackers to slip past security measures that do not scrutinize small packet fragments. Ensuring security devices correctly reassemble and inspect packet fragments is crucial to defend against miniature fragment attacks.
- Mirrored site
Mirrored site: A duplicate copy of a website or web application hosted on a different server or location. It is used to improve availability and reliability by providing a backup site in case the primary site becomes unavailable. Examples include disaster recovery sites and load-balanced sites.
- Mission-critical application
Mission-critical application: An application that is essential to the operation of an organization or business. It is used to classify applications based on their importance and the impact of their failure on the organization. Examples include financial systems, healthcare systems, and emergency response systems.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions.
If you find any errors, please let us know.
Share our FREE resources with your friends and study buddies.
Start your certification studying today:
-
34 hours of CISSP videos
-
5,000+ CISSP questions
-
A 300-page CISSP study guide
-
120-page quick sheets
-
CISSP Mnemonics
-
A CISSP study plan
-
A 2,500-page CISSP Glossary
-
The 24/7 CISSP ThorBot (chatbot)
-
2,500 CISSP Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
32 hours of CISM videos
-
900 CISM questions
-
A 200-page CISM study guide
-
CISM Mnemonics
-
A CISM study plan
-
A 2,500-page CISM Glossary
-
The 24/7 CISM ThorBot (chatbot)
-
2,500 CISM Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access
-
17 hours of CC videos
-
1,700+ CC questions
-
A 120-page CC study guide
-
CC Mnemonics
-
A CC study plan
-
A 2,500-page CC Glossary
-
The 24/7 CC ThorBot (chatbot)
-
2,500 CC Flashcards
-
Subtitles English, Spanish (Latin America), Portuguese (Brazil), French, Arabic, Chinese, Japanese, and Hindi
-
Lifetime or 12-months access