Critical Incident Management

 < Day Day Up > 


M

MAC, see Mandatory Access Control

Mailing lists, 488, 495

CERT™ advisory, 495

Internet firewalls, 495

USENET newsgroups, 496

VIRUS-L list, 495

World Wide Web pages, 496

Malicious code attacks, 315

anonymous remailers, 323

attacker identity, 321

digital bloodhounds, 317

domain registration payments, 322

Dynamic Host Control Protocol, 320

IP addresses, 318

nicks and monikers, 322

trace route, 319

Trojan horses and logic bombs, 316

viruses, 315

Malicious programming, 24

Malware, 5

Management metrics, 43

Mandatory Access Control (MAC), 155, 156

Maryland v. Brady, 372

McLaren v. Microsoft Corp., 394

Media

contact log, 37

duplication, 269

mirror image, 377

Medical Laboratory Management Consultants v. ABC, Inc., 395

Melissa virus, 329

Mentor assignment, 108

Merchant accounts, 214

Microsoft, see also Windows

Internet Information Server, 242

Script Debugger, 169

Mirror image media, 377

MN Desk Reference, 503

Model(s)

Capability Maturity, 44, 47

firefighter response, 231

quality, 43

Modem lines, management of, 473

Morris Worm, 229

Murphy's Law, 32, 139-140, 176


 < Day Day Up > 

Категории