Mutual Authentication

This type of authentication is a process where two parties in communication verify each other before a data exchange can take place....

January 11, 2023
Multilevel Security (MLS)

Multi-Level Security is a system used to classify the level of access users have based on their hierarchy to allow visibility to...

January 11, 2023
Multi Factor Authentication (MFA)

The use of more than two different methods of identification.

January 11, 2023
Managed Detection & Response (MDR)

Managed Detection and Response - A managed service that provides detection of malicious activity in an organisation's network as well as rapid...

January 11, 2023
Man-in-the-middle (MitM) Attack

A Man in the Middle attack is an attack whereby an attacker has inserted themselves between two devices and is listening to,...

January 11, 2023
Managed Security Services Providers (MSSP)

Provides outsources monitoring and management of security systems or devices, including managed firewalls and vulnerability scanning.

January 11, 2023
Malware

Examples of malicious software are worms, viruses, trojans or any other code or content that causes a security problem within a system.

January 11, 2023
Malicious Code

Software that the user wasn’t expecting and that they didn’t ask for that can do harm.

January 11, 2023
Macro Virus

Malware that exploits applications such as word processor or spreadsheet software, otherwise known as macro languages.

January 11, 2023