Cybersecurity Glossary

All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
M
Macro Virus
A virus that uses macro programming options within a document application, such as Microsoft word or excel, to execute malicious code. It causes a sequence of actions to be performed automatically when the application is started. They are often harmless, in comparison to the impact of other virus types. These viruses normally inject some text into a document while the user is writing. One well known example is the Melissa virus.
Malicious Applet
An applet is a small application that performs a specific task within a larger program. One of the most used are Java applets that are used to place items on a web page. A malicious applet is a small application programs that automatically downloads and executes and performs an unauthorized function. It can capture keystrokes, compromise the user’s privacy and steal system resources. Web browsers should monitor applet activities to avoid the threat.
Malicious Code
Any code that is written to cause undesired effects, or harm to a system. Viruses, worms, Trojans, spyware, adware, ransomware, rootkits, etc., are all examples of malicious code.
Malvertisement
Malicious advertising that is used to spread malware. It is the act of injecting malicious code into an online advertisement, and injecting them into legitimate webpages. This is currently one of the top hijacking choices for organized crime.
Malvertising
Malicious advertising, that involves injecting malware or malicious code into an online advertisement. There is little to no user interaction required. In 2016 1.3 billion represented the number of monthly traffic for msn.com who was struck by a malvertising campaign in the same year. It was estimated about 70 percent of those page views delivered a ransomware payload.
Malware
Malicious code or software that is used to damage, disrupt or disable a computer system. Malware can also be used to give a potential hacker access to a computer system and the sensitive information it contains.
Malware-as-a-Service
A business ran on the dark web or black market, that offers an array of services. A user can purchase malicious code, an exploit, a toolkit to deploy the code, or they can illicit the services of a black hat hacker.
Man-in-the-Middle Attack (MitM)
Sometimes referred to a bucket brigade attack, is when an attacker secretly relays or alters communication between two parties. Eavesdropping is an example of an attack that does not alter communication. An attacker can distribute malware that gives them control of a user’s web browser and all of the data sent and received. The hacker can then redirect users to a fake site while creating a connection to the legitimate site and act like a proxy giving them the ability to intercept, read, and modify the traffic between the user and the legitimate site. Banking and e-commerce sites are the biggest targets for MitM attacks. Enforcing the use of endpoint authentication is a way to avoid this type of attack.
Maximum Tolerable Downtime (MTD)
The maximum amount of time an organization can be inoperable before its survival is at risk. When writing a business impact analysis, the sum of the Recovery Time Objective (RTO), which determines the maximum tolerable amount of time needed to bring critical systems back online, and the Work Recovery Time (WRT), which calculates amount of time needed to verify system and data integrity, are used to determine the MTD.
Mazar BOT
Malware that specifically targets Android devices. First emerging in February 2016, the malware is sent via SMS or MMS and contains a link to a malicious app file. Once infected the Mazar BOT gains admin rights to the phone giving the hackers complete access over the phone.
Mobile Code
The ability to for running programs, code or object to be migrated from one machine or application to another.
Mobile Phone Malware
Malicious code written specifically to exploit weaknesses in cell phones. Though cell phones have increased in accessibility and subsequently use, the use of mobile viruses dates back to 2000 when a SMS message containing a malicious payload was discovered having originated from Spain. Now there are viruses that are spread through Bluetooth, games, MMS, SMS, or applications. The Google Play and Apple App store work hard to derail the spread of viruses through their digital application distribution platforms by performing quality control checks, but despite these efforts some malicious programs have been able to get through though they were quickly discovered and removed, but not before causing damage to infected phones. Security experts warn against clicking on urls in text messages sent from unknown numbers and avoid downloading apps from unknown third party sources. Using the digital application distribution platform associated with your device is the safest way to download content.
Moderate Impact
A security item, to include vulnerabilities or cyber threats, that, if exploited, would cause a potentially significant loss, or have major impact to the confidentiality, integrity or availability to the information system. This would include the potential damage to the company’s financials, reputation, ability to function or harm to its people.
Multifactor Authentication
Using two or more authentication types to identify a user. Authentication types include something a user has, like a token, something a user knows, like username or password, and something they are, which is biometrics. An example of multifactor authentication is having to use your thumbprint and a pin to access an application or service.