Wireless Operational Security
M
MAC
ACL functionality, 179
address spoofing/circumventing filters, 201 “2
Macro viruses, 217 “18
Malicious code attacks, 71 “72, 217 “20
macro viruses, 217 “18
spyware, 219 “20
Trojan horses, 219
virus incidents, 217
worms, 218 “19
See also Attacks
Malicious coders, 9
Malicious hackers, 8
Mandatory access control model, 26 “27
MIDP 2.0, 148
MiniStumbler, 196
Misuse, 72
Mobile IP, 258 “60
clients , 258
firewalls and, 259
IP datagrams and, 259
specification, 258
Mobile security, 129 “50
authentication, 137 “38
certificates, 129 “37
code signing, 149
content-based, 138 “39
cryptography toolkits, 141 “47
data, 147 “48
device, 140
device-specific APIs, 147
distributed access control, 140
ubiquity, 137
verification, 149 “50
Multifactor authentication, 301 “2
Multipurpose Internet Mail Extensions (MIME), 102 “3