Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. machine learning and evolutionUpdated Jan 06, 2026

    A field concerned with designing and developing artificial intelligence algorithms for automated knowledge discovery and innovation by information systems.

  2. macro virusUpdated Jan 06, 2026

    A type of malicious code that attaches itself to documents and uses the macro programming capabilities of the document’s application to execute, replicate, and spread or propagate itself.

  3. magnetic remanenceUpdated Jan 06, 2026

    Magnetic representation of residual information remaining on a magnetic medium after the medium has been cleared. [NCS25] (See: clear, degauss, purge.)

  4. main modeUpdated Jan 06, 2026

    See: /IKE/ under "mode".

  5. maintenance hookUpdated Jan 06, 2026

    "Special instructions (trapdoors) in software allowing easy maintenance and additional feature development. Since maintenance hooks frequently allow entry into the code without the usual checks, they are a serious security risk if they are not removed prior to live implementation." [C4009] (See: back door.)

  6. malicious appletUpdated Jan 06, 2026

    A small application program that is automatically downloaded and executed and that performs an unauthorized function on an information system.

  7. malicious codeUpdated Jan 06, 2026

    Program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.

  8. malicious logicUpdated Jan 06, 2026

    Hardware, firmware, or software that is intentionally included or inserted in a system to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.

  9. MalvertisingUpdated Jan 06, 2026

    Adversaries may purchase online advertisements that can be abused to distribute malware to victims. Ads can be purchased to plant as well as favorably position artifacts in specific locations online, such as prominently placed within search engine results. These ads may make it more difficult for users to distinguish between actual search results and advertisements.(Citation: spamhaus malvertising) Purchased ads may also target specific audiences using the advertising network’s capabilities, potentially further taking advantage of the trust inherently given to search engines and popular websites.

  10. MalwareUpdated Jan 06, 2026

    Malware is malicious software designed to disrupt, damage, or gain unauthorized access to systems and data.

  11. managerUpdated Jan 06, 2026

    A person who controls the service configuration of a system or the functional privileges of operators and other users. (See: administrative security. Compare: operator, SSO, user.)

  12. mandatory access controlUpdated Jan 06, 2026

    An access control service that enforces a security policy based on comparing (a) security labels, which indicate how sensitive or critical system resources are, with (b) security clearances, which indicate that system entities are eligible to access certain resources. (See: discretionary access control, MAC, rule based security policy.)

  13. man-in-the-middle attackUpdated Jan 06, 2026

    A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data to masquerade as one or more of the entities involved in a communication association. (See: hijack attack, piggyback attack.)

  14. Manipulate I/O ImageUpdated Jan 06, 2026

    Adversaries may manipulate the I/O image of PLCs through various means to prevent them from functioning as expected. Methods of I/O image manipulation may include overriding the I/O table via direct memory manipulation or using the override function used for testing PLC programs. (Citation: Dr. Kelvin T. Erickson December 2010) During the scan cycle, a PLC reads the status of all inputs and stores them in an image table. (Citation: Nanjundaiah, Vaidyanath) The image table is the PLCs internal storage location where values of inputs/outputs for one scan are stored while it executes the user program. After the PLC has solved the entire logic program, it updates the output image table. The contents of this output image table are written to the corresponding output points in I/O Modules.

  15. manipulation detection codeUpdated Jan 06, 2026

    Synonym for "checksum".

  16. Manipulation of ControlUpdated Jan 06, 2026

    Adversaries may manipulate physical process control within the industrial environment. Methods of manipulating control can include changes to set point values, tags, or other parameters. Adversaries may manipulate control systems devices or possibly leverage their own, to communicate with and command physical control processes. The duration of manipulation may be temporary or longer sustained, depending on operator detection.

  17. Manipulation of ViewUpdated Jan 06, 2026

    Adversaries may attempt to manipulate the information reported back to operators or controllers. This manipulation may be short term or sustained. During this time the process itself could be in a much different state than what is reported. (Citation: Corero) (Citation: Michael J. Assante and Robert M. Lee) (Citation: Tyson Macaulay)

  18. MartianUpdated Jan 06, 2026

    A packet that arrives unexpectedly at the wrong address or on the wrong network because of incorrect routing or because it has a non registered or ill formed IP address. [R1208]

  19. masqueradeUpdated Jan 06, 2026

    A type of threat action whereby an unauthorized entity gains access to a system or performs a malicious act by illegitimately posing as an authorized entity. (See: deception.)

  20. Masquerade File TypeUpdated Jan 03, 2026

    Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, icon, and contents. Various file types have a typical standard format, including how they are encoded and organized. For example, a file’s signature (also known as header or magic bytes) is the beginning bytes of a file and is often used to identify the file’s type. For example, the header of a JPEG file, is <code 0xFF 0xD8</code and the file extension is either , or .

  21. MasqueradingUpdated Jan 06, 2026

    Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name, location, or appearance of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.

  22. Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by giving artifacts the name and icon of a legitimate, trusted application (i.e., Settings), or using a package name that matches legitimate, trusted applications (i.e., ).

  23. Adversaries may match or approximate the name or location of legitimate files, Registry keys, or other resources when naming/placing them. This is done for the sake of evading defenses and observation.

  24. MavinjectUpdated Jan 03, 2026

    Adversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Virtualization Injector, a Windows utility that can inject code into external processes as part of Microsoft Application Virtualization (App V).(Citation: LOLBAS Mavinject)

  25. merchantUpdated Jan 06, 2026

    "A seller of goods, services, and/or other information who accepts payment for these items electronically." [SET2] A merchant may also provide electronic selling services and/or electronic delivery of items for sale. With SET, the merchant can offer its cardholders secure electronic interactions, but a merchant that accepts payment cards is required to have a relationship with an acquirer. [SET1, SET2]

  26. merchant certificateUpdated Jan 06, 2026

    A public key certificate issued to a merchant. Sometimes used to refer to a pair of such certificates where one is for digital signature use and the other is for encryption.

  27. A CA that issues digital certificates to merchants and is operated on behalf of a payment card brand, an acquirer, or another party according to brand rules. Acquirers verify and approve requests for merchant certificates prior to issuance by the MCA. An MCA does not issue a CRL, but does distribute CRLs issued by root CAs, brand CAs, geopolitical CAs, and payment gateway CAs. [SET2]

  28. mesh PKIUpdated Jan 06, 2026

    A non hierarchical PKI architecture in which there are several trusted CAs rather than a single root. Each certificate user bases path validations on the public key of one of the trusted CAs, usually the one that issued that user's own public key certificate. Rather than having superior to subordinate relationships between CAs, the relationships are peer to peer, and CAs issue cross certificates to each other. (Compare: hierarchical PKI, trust file PKI.)

  29. A specific ANSI standard for a checksum that is computed with a keyed hash that is based on DES. [A9009] Usage: a.k.a. Data Authentication Code, which is a U.S. Government standard. [FP113] (See: MAC.)

  30. message digestUpdated Jan 06, 2026

    Synonym for "hash result". (See: cryptographic hash.)

  31. message handling systemUpdated Jan 06, 2026

    Synonym for the Internet electronic mail system.

  32. message indicatorUpdated Jan 06, 2026

    Synonym for "initialization value". (Compare: indicator.)

  33. message integrity codeUpdated Jan 06, 2026

    Synonyms for some form of "checksum".

  34. Message Security ProtocolUpdated Jan 06, 2026

    A secure message handling protocol [SDNS7] for use with X.400 and Internet mail protocols. Developed by NSA's SDNS program and used in the U.S. DoD's Defense Message System.

  35. meta-dataUpdated Jan 06, 2026

    Descriptive information about a data object; i.e., data about data, or data labels that describe other data. (See: security label. Compare: metadata)

  36. Proprietary variants of "meta data". (See: SPAM(trademark).)

  37. MetaverseUpdated Jan 06, 2026

    A shared, immersive, persistent, 3D virtual space where humans experience life in ways they could not in the physical world

  38. MIME Object Security ServicesUpdated Jan 06, 2026

    An Internet protocol [R1848] that applies end to end encryption and digital signature to MIME message content, using symmetric cryptography for encryption and asymmetric cryptography for key distribution and signature. MOSS is based on features and specifications of PEM. (See: S/MIME.)

  39. A technical description to provide a basis for interoperation between PKI components from different vendors; consists primarily of a profile of certificate and CRL extensions and a set of transactions for PKI operation. [SP15]

  40. misappropriationUpdated Jan 06, 2026

    A type of threat action whereby an entity assumes unauthorized logical or physical control of a system resource. (See: usurpation.)

  41. missionUpdated Jan 06, 2026

    A statement of a (relatively long term) duty or (relatively short term) task that is assigned to an organization or system, indicates the purpose and objectives of the duty or task, and may indicate the actions to be taken to achieve it.

  42. mission criticalUpdated Jan 06, 2026

    A condition of a system service or other system resource such that denial of access to, or lack of availability of, the resource would jeopardize a system user's ability to perform a primary mission function or would result in other serious consequences. (See: Critical. Compare: mission essential.)

  43. mission essentialUpdated Jan 06, 2026

    Refers to materiel that is authorized and available to combat, combat support, combat service support, and combat readiness training forces to accomplish their assigned missions. [JP1] (Compare: mission critical.)

  44. MISSI userUpdated Jan 06, 2026

    A system entity that is the subject of one or more MISSI X.509 public key certificates issued under a MISSI certification hierarchy. (See: personality.)

  45. misuseUpdated Jan 06, 2026

    The intentional use (by authorized users) of system resources for other than authorized purposes. Example: An authorized system administrator creates an unauthorized account for a friend. (See: misuse detection.)

  46. misuse detectionUpdated Jan 06, 2026

    An intrusion detection method that is based on rules that specify system events, sequences of events, or observable properties of a system that are believed to be symptomatic of security incidents. (See: IDS, misuse. Compare: anomaly detection.)

  47. mitigationUpdated Jan 06, 2026

    The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.

  48. mobile codeUpdated Jan 06, 2026

    Software that originates from a remote server, is transmitted across a network, and is loaded onto and executed on a local client system without explicit initiation by the client's user and, in some cases, without that user's knowledge. (Compare: active content.)

  49. mode of operationUpdated Jan 06, 2026

    A technique for enhancing the effect of a cryptographic algorithm or adapting the algorithm for an application, such as applying a block cipher to a sequence of data blocks or a data stream. (See: CBC, CCM, CMAC, CFB, CTR, ECB, OFB.)

  50. Modify Alarm SettingsUpdated Jan 06, 2026

    Adversaries may modify alarm settings to prevent alerts that may inform operators of their presence or to prevent responses to dangerous and unintended scenarios. Reporting messages are a standard part of data acquisition in control systems. Reporting messages are used as a way to transmit system state information and acknowledgements that specific actions have occurred. These messages provide vital information for the management of a physical process, and keep operators, engineers, and administrators aware of the state of system devices and physical processes.