Security and Usability: Designing Secure Systems That People Can Use

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Macintosh

     applications as single icons, displaying

     email access, securing

     email attachment viruses, eliminating main propagation method of

     file access, securing

     OS 10.3, user interface error

     viruses/worms

MailFrontier, study of phishing attack success

mailing lists, as security administration tool

Mainwaring, Scott D.

malware

     file changes

man-in-the-middle attacks

manipulation, as criterion of informed consent

Marsh, Steve

Martin, David

Mathewson, Nick

meaningfulness, authentication memorability

     authentication keys

medium-fidelity prototypes of user interface

Melissa virus

memometric authentication 2nd

memorability

     aspects of

    criterion for evaluating

         authentication

         challenge questions systems

     graphical passwords

         order of images

         picture effect and

         user-selected

     memory as human factor

     methods of remembering

     mnemonic-based passwords

     passwords

     recognition and

     security and, tradeoff in password selection

     uncued recall

message boards, web bugs and

messages

    encrypting

         IBM Lotus Notes/Domino

         PGP v5.0, usability evaluation

         user reluctance

     forged

     retrieving, phishing attack defense

     user feedback in postrelease, analyzing

Microsoft

     users and trust

     users, researching

Microsoft Internet Explorer

     consent dialogs

     extensibility of, Bugnosis user interface

     file download dialogs

     remote software installation

     SpoofGuard

     spoofing identification cues

     version 5, Privacy Bird add-on

    version 6

         P3P functionality in

         peripheral awareness system

         Privacy Bird add-on

Microsoft SQL Server

    passwords and

         SQLSnake/Spida worm

     Slammer worm

     SQLSnake/Spida worm

Microsoft Word

     Melissa virus

Miller, Robert

MIME (Multipurpose Internet Mail Extensions)

minimal distraction, informed consent model

mirror sites, phishing and

Mixmaster networks

Mixminion network

mMode Find People Nearby service (AT&T), information flow, obscuring

mnemonic-based passwords

     difficulty of cracking

     memorability of

monitoring 2nd

     application for biometric authentication

     data mining and

     intrusion detection systems 2nd

     local drives, tools for

     minimizing attacks by

     networks

         in real time

         log analysis 2nd

         scan reports, analyzing

     surveillance and, applications for keystroke authentication

     web logs, scanning 2nd

     with code samples

Monrose, Fabian

MOO (Object Oriented MUDMultiple User Dialog), as security administration tool 2nd 3rd

Moromisa, George

Moskowitz, Courtney

MoTEC model of trust

Mozilla Firefox

     Cookie Manager tool, redesign

     file access options

     version 1.73, peripheral awareness system

Mozilla Foundation

Multics operating system, internal security between users

Multipurpose Internet Mail Extensions (MIME)

MyDoom virus

     case study of

     signature detection in web logs

Mynatt, Elizabeth D.

Категории