АБВГДЕЖЗИКЛМНОПРСТУФХЦЧШЭЯ ABCDEFGHIKLMNOPQRSTUVWZ Machine learning (ML)Machine learning algorithmMachine learning modelMacro virusMail bombMajor nonconformityMalicious codeMalware, malicious softwareMan-in-the-middleMan-in-the-middle attack (MITM)ManagementManagementManagement systemManagement system consultancyManager security service provider (MSSP)Mandatory access controlMandatory access controlManipulation detectionManipulation detectionMapping free of error propagationMapping free of error propagationMaskueradeMaster keyMaster keyMaurer universal testMeasurementMedium strength of functionMeet-in-the-middle attackMeet-in-the-middle methodMemory using attack, memory-used search attackMemory using cryptanalysisMemory-scraping attacksMessageMessage authenticationMessage authentication code (MAC)Message authentication code modeMessage authentication code modeMessage authentication code, seal, integrity check valueMessage authentication protocolMessage integrityMinor nonconformityMisuseMixing propertyMixing transformMobile content management (MCM)Mobile device management (MDM)ModelModel trainingModuleModule managerModule propertyModule with hardware aspects and software aspects, hardware-software moduleMonitoringMonitoringMonitoring attackMoving probable word attackMoving probable word cryptanalysisMulti-factor authentication (MFA)Multi-signatureMultilevel securityMultilevel securityMultiparty computationMultiple digital signatureMultiple vulnerabilitiesMutual authentication