Skip to main content
. 2 3 A B C D E F G H I J K L M N O P Q R S T U V W X Z

M

MAC

Media Access Control

MacBook

The MacBook is Apple's third laptop computer family. MacBooks featured Apple's Retina Display and higher resolutions, as well as the Force Touch trackpad that senses different pressure levels.

Machine learning

A type of artificial intelligence (AI) that allows software applications to become more accurate in predicting outcomes without being explicitly programmed. The basic premise of machine learning is to build algorithms that can receive input data and use statistical analysis to predict an output value within an acceptable range.

Macintosh

The Macintosh computer (often referred to as the Mac) is a desktop computer by Apple that comes in a variety of form factors and designs. The Macintosh was the first affordable and successful computer packed with a graphical user interface and mouse, although technically, Apple's Lisa was the first commercial computer that included these components.

Macro

An instruction that causes the execution of a predefined sequence of instructions.

Malicious

Intending or intended to do harm.

Malicious advertising

Malicious advertising is the use of online advertising to spread malware. It typically involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.

Malicious code

Any software that attempts to subvert the confidentiality, integrity or availability of a system.

Malicious code infection

The occurrence of malicious code infecting a system.

Malicious email

A malicious email is an email which has been deliberately crafted to cause problems on the server or on the client. This could be due to the message containing a virus, or it could be due to the message being crafted in such a way as to take advantage of a weakness in the receiving mail client.

Malicious Insider

Malicious insiders are people who take advantage of their access to inflict harm on an organisation.

Malicious links

A malicious link is created with the purpose of promoting scams, attacks and frauds. By clicking on an infected URL, you can download malware such as a Trojan or virus that can take control of your devices, or you can be persuaded to provide sensitive information on a fake website.

Malicious software

Malicious software is any software that brings harm to a computer system. Malware can be in the form of worms, viruses, trojans, spyware, adware and rootkits etc., which steal protected data, delete documents or add software not approved by a user.

Malvertising

The use of online advertising to spread malware. Malvertising involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages.

Malware

Malicious software used to gain unauthorised access to computers, steal information and disrupt or disable networks. Types of malware include trojans, viruses and worms.

Managed Service Provider

A managed service provider is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

Managed Service Provider Partner Program

The Managed Service Provider Program is a program developed by the Australian Cyber Security Centre and is designed to lift the cyber security posture of managed service providers in Australia.

Management traffic

Traffic generated by system administrators over a network in order to control workstations and servers. This includes standard management protocols and traffic that contains information relating to the management of the network.

Maturity model

A maturity model is a conceptual model that consists of a sequence of discrete maturity levels for a class of processes in one or more business domains, and represents an anticipated, desired or typical evolutionary path for these processes.

Media

A generic term for hardware, often portable in nature, which is used to store information.

Media destruction

The process of physically damaging media with the intent of making information stored on it inaccessible. To destroy media effectively, only the actual material in which information is stored needs to be destroyed.

Media disposal

The process of relinquishing control of media when it is no longer required.

Media release

The media release is a document that is sent to news outlets or journalists to inform them about a story that an individual wants media coverage for.

Media sanitisation

The process of erasing or overwriting information stored on media so that it cannot be retrieved or reconstructed.

Messenger

Messenger is an American messaging app and platform developed by Facebook.

Metadata

Descriptive information about the content and context used to identify information.

MFA

Multi-factor authentication

MFD

Multifunction device

Microsoft

Microsoft is an American multinational corporation that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services.

Microsoft Office

Microsoft Office is a family of client software, server software, and services developed by Microsoft.

Microsoft support

Microsoft support is a service available to help you with questions about Microsoft products and services.

Microsoft Windows

Microsoft Windows is a series of graphical interface operating systems developed, marketed and sold by Microsoft.

Migration

Is the moving of data and applications between two different computers.

MIMO

Multiple-input and multiple-output

Mobile base stations

A mobile base station is a transmission and reception station in a fixed location, consisting of one or more receive/transmit antenna, microwave dish, and electronic circuitry, used to handle cellular traffic.

Mobile device

A portable computing or communications device. For example, a laptop, mobile phone or tablet.

Mobile phones

A mobile phone is a wireless handheld device that allows users to make and receive calls and to send text messages, among other features.

Mozilla

Mozilla is a software community that uses, develops, spreads and supports Mozilla products, notably the Firefox web browser.

MSP

Managed Service Provider

MSP3

Managed Service Provider Partner Program

Multi-factor authentication

A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are).

Multifunction device

ICT equipment that combines printing, scanning, copying, faxing or voice messaging functionality in the one device. These devices are often designed to connect to computer and telephone networks simultaneously.

My Guide

My Guide is a short guide to help individuals put in place some good online security habits. My Guide helps you stay smart online so you can avoid falling victim to scammers.

m

mCommerce

Mobile commerce

mSATA

Mini-Serial Advanced Technology Attachment