Accessibility Links

Infosec
English 繁體版 简体版

Navigation Menu 1

General UsersYoungsters & StudentsParents and TeachersIT ProfessionalsSME
FAQ Search :
Change text size: Text Size: Default Size (A) Text Size: Larger (A) Text Size: Largest (A)
general user youngsters and students parents and teachers IT professionals sme

Navigation Menu 2

 

  

 
 
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Index for glossary M

 

Mail Bomb

Malicious Code

Malware

 

Man in the Middle (MITM) Attack

Masquerading

Media Sanitisation

 

Message Digest

Multifactor Authentication

 

Mail Bombs

A mail bomb is the sending of a massive amount of email to a specific person or system. A huge amount of mail may simply fill up the recipient's disk space on the server or, in some cases, may be too much for a server to handle and may cause the server to stop functioning.

back to top Top

Malicious Code

Malicious code refers to computer viruses, worms, spyware, Trojan Horses and other undesirable software. Attack made by using such software is to cause disruption either by deleting files, sending emails, or rendering the host system inoperable.

back to top Top

Malware

A generic term for a number of different types of malicious code.

back to top Top

Man in the Middle (MITM) Attack

A man-in-the-middle attack (MITM) is an attack in which an attacker sits between two parties (the sender and receiver), captures and modify the communication messages of the two parties, and then sends the modified messages to the two parties.

back to top Top

Masquerading

A system entity illegitimately poses as (assumes the identity of) another entity.

back to top Top

Media Sanitisation

It is a process by which data is irreversibly removed from media or the media is permanently destroyed.

back to top Top

Message Digest

A compact representative of a message that is created by a cryptographic algorithm. It changes with the original message.

back to top Top

Multifactor Authentication

Authentication using two or more factors. Factors include: (i) something you know (e.g. password/PIN); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric).

 
 
     
Back back to topTop
 

Footer Menu

Sitemap | Contact Us | Privacy Policy | Important Notices
 
General Users Youngsters & Students Parents & Teachers IT Professionals SME