The Security Guide Security Guide RSS Feed


Internet and Data Security Knowledgebase

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 


MAC address filtering Each network card has a unique ID called a MAC.
A wireless network access point can be configured to give access to specific network cards (and the computers in which they are installed) and exclude others on the basis of these MAC addresses.
It is trivial to change your address to spoof another machine, so this is not all that useful to protect Wireless network devices.
MBSA The Microsoft Baseline Security Analyzer (MBSA) tool includes a graphical and command-line interface, can perform local or remote scans of computers running Windows to identify missing security updates. E.g.:
- Whether the Guest account is disabled.
- Whether there are any user accounts that have non-expiring passwords.
- Whether auditing is configured.
- Whether the computer is properly restricting anonymous access.
- Unnecessary services that are installed on the system.
- IIS security issues.
- Internet Explorer zone settings and Enhanced Security Configuration checks.
- Office macro security.
- Automatic Updates configuration.
- Internet Connection Firewall (ICF) and Windows Firewall configuration.
Macro virus A macro virus uses the macro capabilities of common applications like word processors to implement virus-like behaviour.
Mail bomb An excessively large amount of e-mail data sent to a user's e-mail address in an attempt to make the user's e-mail program crash or to prevent the user from receiving further legitimate messages.
Mail relaying A practice in which an attacker sends e-mail messages from another system's e-mail server in order to use its resources and/or make it appear that the messages originated from the other system.
Malware Malware can be classified as trojans with a limited payload and are often not detected by most antivirus software. They may require the use of other software designed to detect other classes of malware, including spyware
Multi factors authentication A secure way for a remote resource to identify someone, is by using multiple factors to prove who you are. This is very much based on how identify works in the real world:
- Something you know: One factor is something you know, such as a password, PIN number or secret phrase.
- Something you have: Another factor is an item that you have, such as an ATM card or a key.
- Something you are: The last factor is something that is unique to you, such as a finger print or retina scan.

© RuleWorks - All Rights Reserved - Policy -