Wireless Operational Security

M

MAC

ACL functionality, 179

address spoofing/circumventing filters, 201 “2

Macro viruses, 217 “18

Malicious code attacks, 71 “72, 217 “20

macro viruses, 217 “18

spyware, 219 “20

Trojan horses, 219

virus incidents, 217

worms, 218 “19

See also Attacks

Malicious coders, 9

Malicious hackers, 8

Mandatory access control model, 26 “27

MIDP 2.0, 148

MiniStumbler, 196

Misuse, 72

Mobile IP, 258 “60

clients , 258

firewalls and, 259

IP datagrams and, 259

specification, 258

Mobile security, 129 “50

authentication, 137 “38

certificates, 129 “37

code signing, 149

content-based, 138 “39

cryptography toolkits, 141 “47

data, 147 “48

device, 140

device-specific APIs, 147

distributed access control, 140

ubiquity, 137

verification, 149 “50

Multifactor authentication, 301 “2

Multipurpose Internet Mail Extensions (MIME), 102 “3

Категории