Terms
Alphabetical index of published term entries. Use the letter rail to jump.
- Modify Cloud Compute InfrastructureUpdated Jan 03, 2026
An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots.
- Modify Cloud Resource HierarchyUpdated Jan 03, 2026
Adversaries may attempt to modify hierarchical structures in infrastructure as a service (IaaS) environments in order to evade defenses.
- Modify Controller TaskingUpdated Jan 06, 2026
Adversaries may modify the tasking of a controller to allow for the execution of their own programs. This can allow an adversary to manipulate the execution flow and behavior of a controller.
- Modify ParameterUpdated Jan 06, 2026
Adversaries may modify parameters used to instruct industrial control system devices. These devices operate via programs that dictate how and when to perform actions based on such parameters. Such parameters can determine the extent to which an action is performed and may specify additional options. For example, a program on a control system device dictating motor processes may take a parameter defining the total number of seconds to run that motor.
- Modify ProgramUpdated Jan 06, 2026
Adversaries may modify or add a program on a controller to affect how it interacts with the physical process, peripheral devices and other hosts on the network. Modification to controller programs can be accomplished using a Program Download in addition to other types of program modification such as online edit and program append.
- Module FirmwareUpdated Jan 06, 2026
Adversaries may install malicious or vulnerable firmware onto modular hardware devices. Control system devices often contain modular hardware devices. These devices may have their own set of firmware that is separate from the firmware of the main control system equipment.
- modulusUpdated Jan 06, 2026
The defining constant in modular arithmetic, and usually a part of the public key in asymmetric cryptography that is based on modular arithmetic. (See: Diffie Hellman Merkle, RSA.)
- MondexUpdated Jan 06, 2026
A smartcard based electronic money system that incorporates cryptography and can be used to make payments via the Internet. (See: IOTP.)
- Monitor Process StateUpdated Jan 06, 2026
Adversaries may gather information about the physical process state. This information may be used to gain more information about the process itself or used as a trigger for malicious actions. The sources of process state information may vary such as, OPC tags, historian data, specific PLC block information, or network traffic.
- Morris WormUpdated Jan 06, 2026
A worm program that flooded the ARPANET in November 1988, causing problems for thousands of hosts. [R1135] (See: community risk, worm)
- moving target defenseUpdated Jan 06, 2026
The presentation of a dynamic attack surface, increasing an adversary's work factor necessary to probe, attack, or maintain presence in a cyber target.
- MulticsUpdated Jan 06, 2026
MULTiplexed Information and Computing Service, an MLS computer timesharing system designed and implemented during 1965 69 by a consortium including Massachusetts Institute of Technology, General Electric, and Bell Laboratories, and later offered commercially by Honeywell.
- Multi-factor AuthenticationUpdated Jan 06, 2026
Multi factor authentication (MFA) uses two or more independent factors to verify identity.
- multilevel secureUpdated Jan 06, 2026
Describes an information system that is trusted to contain, and maintain separation between, resources (particularly stored data) of different security levels. (Examples: BLACKER, CANEWARE, KSOS, Multics, SCOMP.)
- multilevel security modeUpdated Jan 06, 2026
A mode of system operation wherein (a) two or more security levels of information are allowed to be to be handled concurrently within the same system when some users having access to the system have neither a security clearance nor need to know for some of the data handled by the system and (b) separation of the users and the classified material on the basis, respectively, of clearance and classification level are dependent on operating system control. (See: /system operation/ under "mode", need to know, protection level, security clearance. Compare: controlled mode.)
- Multipurpose Internet Mail ExtensionsUpdated Jan 06, 2026
An Internet protocol (RFC 2045) that enhances the basic format of Internet electronic mail messages (RFC 822) (a) to enable character sets other than U.S. ASCII to be used for textual headers and content and (b) to carry non textual and multi part content. (See: S/MIME.)
- mutual suspicionUpdated Jan 06, 2026
The state that exists between two interacting system entities in which neither entity can trust the other to function correctly with regard to some security requirement.