Security in Computing, 4th Edition

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

MAC (mandatory access control)

MAC (Media Access Control) address

Mafia boss case study

Mafiaboy

Magnetic remanence

Malformed packets

Malicious code [See also Nonmalicious errors; Programs, security; Viruses; Worms.]

     agents

     history of

     implementation time

     interface illusions

     keystroke logging

     logic bombs

     man-in-the-middle attacks

     potential for harm

     privilege escalation

     rabbits

     rootkit revealers

     rootkits

     Sony XCP (extended copy protection) rootkit

     spoofing

     threat assessment

     time bombs

     timing attacks

     Trojan horses

     types of 2nd

     worms

     zero day exploits

Malware [See Malicious code.]

MAN (metropolitan area network)

Man-in-the-middle attacks 2nd [See also Impersonation; Masquerade; Spoofing.]

Managers, security responsibilities

Mandatory access control (MAC)

Mapping controls to vulnerabilities 2nd

Marginal cost

Marketability, evaluating

Marks, Leo

MARS algorithm

Masquerade [See also Man-in-the-middle ; Spoofing.]

Mathematics of cryptography [See Cryptography.]

MD4 hash function

MD5 hash function

Mean attacks

Media Access Control (MAC) address

Media, network

Median attacks

Mediation

     complete 2nd

     incomplete 2nd

Memory and address protection

     base/bounds registers

     context switch

     fences

     page frames

     paging 2nd

     Palladium (protect memory project)

     principles of trusted systems 2nd

     relocation

     relocation factor

     segment address table

     segmentation 2nd

     tagged architecture

Memory-resident viruses

MerkleHellman knapsacks 2nd

Message confidentiality

Message digests [See Cryptographic checksum.]

Message integrity

Method, opportunity, motive (MOM)

Methods of

    attack [See Attacks, methods.]

    defense [See Controls; Defense methods.]

Metropolitan area network (MAN)

MIC (message integrity check)

Microcontrollers in automobiles

Microcontrollers, automobile control systems

Microsoft

     on career criminals

     on full disclosure

     on passwords

     on product quality

     passport

     patching flaws

     single sign-on

Microsoft Redaction Tool

Microsoft Word, deleting text

Microwave networks

     description

     eavesdropping

     wiretapping

Military security policies

Mining, data [See Data mining.]

Misdelivering messages

Misuse intrusion detection

Mitnick, Kevin

Mix column

Mixmaster remailers

Mixter

Mobile agents

Mobile code

Model-based intrusion detection

Modeling security economics

     credibility

     decision making

     framing the issue

     group behavior

     overview

     role of organizational culture

     transferring models

     trust as economic issue

Models, security [See Security models.]

Modular arithmetic 2nd

Modularity of code

MOM (method, opportunity, motive)

Money, attack motive

Monitoring

     e-mail

     privacy

Monitors 2nd

Monoalphabetic cipher

Moore's Law

Morals [See Ethical issues.]

Morris, Robert, Jr. 2nd

Morris, Robert, Sr.

Motives for attacks

MP3.com

Multics 2nd 3rd

Multifactor authentication

Multilevel databases [See Databases, multilevel.]

Multilevel security

Multiple identities

Multiple virtual memory spaces

Multiplexed signals

Multiprogrammed operating systems

Mundie, Craig 2nd

Mutual authentication

Mutual suspicion

Категории