- Maintenance Hook A maintenance hook, traditionally known as a backdoor, is a method intentionally built into software by its creators that allows for direct access to perform administrative or maintenance tasks. While often used legitimately by developers or support teams, these can be considered security risks if discovered by attackers, as they may be exploited to gain unauthorized access to software or systems.
- Maintenance Key A maintenance key is a specialized type of cryptographic key that is designated specifically for performing maintenance or administrative functions on a system. This key facilitates secure access for tasks like updating software or managing hardware settings, but due to its elevated access privileges, it must be protected to avoid misuse or exploitation.
- Malware A term used to describe any software that is designed to cause harm to a computer or network. It is used to refer to a variety of malicious software, such as viruses, worms, ransomware, and spyware. Examples include the WannaCry ransomware, the Mirai botnet, and the Stuxnet worm.
- Malware Inspection The process of examining files or systems for the presence of malicious software. It can involve a range of techniques, from simple signature-based detection (matching files against a database of known malware) to more sophisticated behavioral or heuristic analysis (looking for abnormal behavior or characteristics that suggest malware). Regular and thorough malware inspections are key for maintaining system health and integrity.
- Managed Detection and Response (MDR) A security service where a third-party provider continuously monitors a network for security threats and responds to them in real-time. It is used in organizations that do not have the resources or expertise to handle security threats on their own. Examples include monitoring network activity for malware and responding to cyberattacks.
- Managed Security Services Providers (MSSPs) Specialized companies that provide outsourced monitoring and management of security systems and devices. Services often include managed firewalls, intrusion detection, virtual private networks, vulnerability scanning, and anti-viral services, among others. MSSPs offer their expertise and dedicated resources to help organizations secure their information systems, manage risk, and meet compliance demands.
- Management The set of activities involved in planning, organizing, and controlling resources to achieve security objectives. This includes defining security policies, overseeing their implementation, setting security goals, allocating resources, and managing personnel responsible for security. Good management practices are essential for maintaining a robust and effective security posture.
- Management Controls The security controls, procedures, and practices that focus on the management of risk and the management of information system security. They involve risk assessment, security planning, system and services acquisition, and security program management. Management controls are designed to ensure that information systems are adequately protected and that risk management strategies are in place and functioning properly.
- Management Information System (MIS) A Management Information System (MIS) is an integrated, user-machine system that provides management with critical information on a regular basis to support operational, tactical, and strategic decision-making processes. MIS encompasses a variety of components, including databases, software applications, hardware, and procedures, designed to compile and analyze data and deliver it as manageable information.
- Mandatory Access Control (MAC) A type of access control where the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In MAC, access rights are determined by the system based on regulations and not the users. It is commonly used in organizations that require a high level of security, such as military institutions.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.