- Message Digest A short, fixed-length value that is generated from a longer message by a cryptographic hashing algorithm. It is used to verify the integrity of the message and to provide authentication. Examples of message digests include SHA-256 and MD5.
- Message Digest 5 (MD5) A widely-used cryptographic hash function that produces a 128-bit (16-byte) hash value from input data. It's commonly used to verify data integrity. However, MD5 is considered to be broken and unsuitable for further use as it's vulnerable to hash collisions, where different inputs produce the same output hash.
- Metadata-based discovery Metadata-based discovery involves analyzing data descriptors to gain insights about stored information without accessing the data itself. It is a method used in cybersecurity to quickly assess system configurations, data usage, and changes over time, aiding in vulnerability assessments and security monitoring. For instance, metadata could reveal the creation date of files, their last access times, and modifications, which is beneficial in incident investigations.
- Metric A quantifiable measure used to track and assess the status of a specific process. In the context of secure operations, metrics can be used to determine the effectiveness of various security measures, track incident response times, measure compliance with security policies or evaluate the success of awareness programs, among others. They provide key insights for decision-makers and help inform strategic planning.
- Metropolitan Area Network (MAN) A computer network that covers a large geographic area, such as a city or town. It is used to connect multiple local area networks (LANs) within a metropolitan area. Examples include campus networks, city-wide networks, and regional networks.
- Microkernel architecture A computer architecture that uses a small, highly modular kernel to provide basic services, such as memory management and task scheduling. It is used in operating systems to improve performance and security by limiting the scope of the kernel. Examples include Mach and QNX.
- Microsegmentation A security technique that enables fine-grained security policies to be assigned to data center applications down to the workload level. This approach enables security controls to be more precisely applied to protect against lateral threats inside a network, and it reduces the network attack surface. If a system component is compromised, the potential for lateral movement of threats is minimized, as each segment is isolated from the others.
- Micro training Micro training refers to short, focused educational or training sessions designed to quickly convey important information or skills. In cybersecurity, microtraining can be used to efficiently address specific threats, educate employees on security best practices, or update teams on new policies, all with the goal of promoting security awareness in a time-effective manner.
- Microwave transmission Microwave transmission is a wireless communication technology that uses high-frequency radio waves to transmit data over short distances. It is commonly used for point-to-point communication links, such as connecting two buildings within a campus or providing a backbone for cellular networks. Due to the line-of-sight nature of microwave signals, security measures must be in place to prevent signal interception or interference.
- Middleware A layer of software that facilitates communication and data management between different applications or components within a system. This software 'glue' enables interaction between disparate systems, acting as a bridge across different databases, networks, operating systems, or programming languages. In a secure environment, middleware must be properly configured and updated to prevent it from becoming a potential vulnerability or entry point for unauthorized access.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.