Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols
M
m mod n
M(i)
m/n
MA
MAC
MAC algorithm
MAC Algoritm
MAC Generation
MAC tag
MAC Verification
MAC(MacKey, MacData)
MacData
MacDataU, (or MacDataV)
Machine Controller
Machine Readable Travel Document
MacKey
MacKeyLen
Macro Virus
MacTag
MacTagLen
MacTagV, (MacTagU)
Magnetic Media
Magnetic Remanence
Magnetic Resonance Imaging
Magneto Optical
Mail Exchange
Mail Exchanger
Mail Server
Mail Server Administrator
Mail Transfer Agent
Mail User Agent
Main Mode
Maintenance
Maintenance (NIST SP 800-53 security control family)
Maintenance Key
Major Application
Major Information System
Major IT investment
Malicious Code
Malicious Cyber Activity
Malicious Logic
Malware
MAM
MAN
Managed Environment
Managed Interface
Managed Security Services Provider
Management Client
Management Control
Management Controls
Management Controls (C.F.D.)
Management Countermeasure
Management Frame
Management Information Base
Management Message
Management Network
Management Security Controls (C.F.D.)
Management Server
Management Service
Mandatory Access Control
Mandatory Modification
Man-In-The-Middle
Man-In-The-Middle Attack
Man-In-The-Middle Attack Resistance
Manipulated Variable
Manipulative Communications Deception (C.F.D.)
Manual Cryptosystem
Manual Key Entry
Manual Key Transport
Manual Remote Rekeying
Manufacturing Execution System
MAO
Maple
Market Research
Marking
Mask
Mask Generation Function
Masquerading
Masquerading (WLAN attack)
Master Boot Record
Master Key
Master Scenario Events List
Master Session Key
Master Terminal Unit
Master Terminal Unitalso Master Telemetry Unit
Match/Matching
MATLAB
Maximum Allowable Outage
Maximum Segment Size
Maximum Tolerable Downtime
Maximum Transmission Unit
MB
Mbps
MBR
MBSA
MCDC
MD
MD5
MDM
MDT
ME
Measured Service
Measurement
Measures
Mechanisms
MED
Media
Media Access Control
Media Access Control (Address)
Media Access Control Address
Media Gateway
Media Gateway Control Protocol
Media Library
Media Protection
Media Protection (NIST SP 800-53 security control family)
Media Sanitization
Medicare Prescription Drug Card Sponsors
Medium
Medium Access Control
Megabit Per Second
Megabits Per Second
Megabyte
Megahertz
MEID
Melting
Memorandum Of Agreement
Memorandum Of Understanding
Memorandum Of Understanding Or Agreement
Memorandum Of Understanding/Agreement
Memory Scavenging
MEP
MES
Message
Message Authentication
Message Authentication Code
Message Authentication Code (MAC)
Message Authentication Codemac Algorithm
Message Authentication Key
Message Digest
Message Digest 5
Message Exchange Pattern
Message Indicator
Message Inject
Message Integrity Code
Message Integrity Code Key
Message Modification (WLAN attack)
Message-Digest Algorithm 5
Metaattributes
Metadata
Metadata (explicit)
Metadata (implicit)
Metadata (bound)
Metadata (compromised)
Metadata Element
Metadata Standards Working Group
Metapolicy
Meter
Method Layer
Metrics
Metropolitan Area Network
MFA
MGC
MGF
mgfSeed
MH
MHz
MI
MIB
MIC
MIC Key
Microcode
Microsoft
Microsoft Baseline Security Analyzer
Microsoft Challenge Handshake Authentication Protocol
Microsoft Challenge-Handshake Authentication Protocol
Microsoft Disk Operating System
Microsoft Knowledge Base
Microsoft Management Console
Microsoft Point To Point Encryption
Microsoft Point-To-Point Encryption
Middleware
Millennium Edition
Millimeter
Milliwatt
MIME
MIMO
min (a, b)
min(x, y)
Min-Entropy
MINEX
Minimalist Cryptography
Minimum Level Of Protection
Minor Application
Minutia Exchange
MIPv4
MIPv6
Mis Training Institute
Misappropriation
Misappropriation (WLAN attack)
Misconfiguration
Misnamed Files
Mission Assurance Category (C.F.D.)
Mission Critical
Mission Support Information
Mission/Business Segment
Mission-Critical Element
Mission-Critical Functionality
MISTI
Misuse Of Controlled Unclassified Information
MITM
MixColumns()
Mixed Life-Cycle Investment
Mj(i)
Mk
MLD
MLDv1
MLDv2
MLS
mm
MMC
MMS
MN
MO
MOA
MOBIKE
Mobile Application Management
Mobile Code
Mobile Code Risk Categories
Mobile Code Technologies
Mobile Data Terminal
Mobile Device
Mobile Device Management
Mobile Devices
Mobile Equipment Identifier
Mobile Ipv4
Mobile Ipv6
Mobile Node
Mobile Prefix Advertisement
Mobile Prefix Solicitation
Mobile Software Agent
Mobile Subscriber
Mobile Subscriber Integrated Services Digital Network
Mobile Switching Center
Mobile Topology
Mobility Header
Mobility Header (IPv6 extension header)
Mode
Mode Of Operation
Model
Modem
Moderate Impact
Moderate Impact System
Moderate-Impact
Moderate-Impact System
Modern Key
Modification, Access, And Creation
Modified Condition Decision Coverage
MODP
Modular Contracting
Modular Exponential
Modular Exponential Diffie-Hellman Group
Module
Morale, Welfare, And Recreation
Most Significant Bit
Most Significant Bit(s)
Motion Control Network
MOU
MOU/A
MP
MPA
MPLS
MPPE
MPS
MQV
MRI
MRTD
Ms
MSB
MSC
MS-CHAP
MSCUID
MS-DOS
MSDP
MSEC
MSEL
MSISDN
MSK
MSKB
MSL
MSS
MSSP
MSWG
MTA
MTU
MUA
Multicast
Multicast Addresses
Multicast Listener Discovery
Multicast Listener Discovery Version 1
Multicast Listener Discovery Version 2
Multicast Security
Multi-Exit Discriminator
Multi-Factor
Multifactor Authentication
Multihoming
Multi-Hop Problem
Multi-Hop Relay Topology
Multi-Level Cross Domain Solution
Multilevel Device
Multilevel Security
Multi-Level Security
Multi-Level Security Domain
Multi-Level Solution
Multimedia Card
Multi-Media Card
Multimedia Messaging Service
Multiple Factor Authentication
Multiple Input, Multiple Output
Multiple Input, Multiple Output Technology
Multiple Security Levels
Multiprotocol Label Switching
Multipurpose Internet Mail Extensions
Multi-Rate Padding
Multi-Releasable
Multi-Source Discovery Protocol
Mutual Authentication
mW
MWR
MX