N



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

MAC (mandatory access control)
MAC (Media Access Control) address
Mafia boss case study
Mafiaboy
Magnetic remanence
Malformed packets
Malicious code [See also Nonmalicious errors; Programs, security; Viruses; Worms.]
     agents
     history of
     implementation time
     interface illusions
     keystroke logging
     logic bombs
     man-in-the-middle attacks
     potential for harm
     privilege escalation
     rabbits
     rootkit revealers
     rootkits
     Sony XCP (extended copy protection) rootkit
     spoofing
     threat assessment
     time bombs
     timing attacks
     Trojan horses
     types of 2nd
     worms
     zero day exploits
Malware [See Malicious code.]
MAN (metropolitan area network)
Man-in-the-middle attacks 2nd [See also Impersonation; Masquerade; Spoofing.]
Managers, security responsibilities
Mandatory access control (MAC)
Mapping controls to vulnerabilities 2nd
Marginal cost
Marketability, evaluating
Marks, Leo
MARS algorithm
Masquerade [See also Man-in-the-middle ; Spoofing.]
Mathematics of cryptography [See Cryptography.]
MD4 hash function
MD5 hash function
Mean attacks
Media Access Control (MAC) address
Media, network
Median attacks
Mediation
     complete 2nd
     incomplete 2nd
Memory and address protection
     base/bounds registers
     context switch
     fences
     page frames
     paging 2nd
     Palladium (protect memory project)
     principles of trusted systems 2nd
     relocation
     relocation factor
     segment address table
     segmentation 2nd
     tagged architecture
Memory-resident viruses
MerkleHellman knapsacks 2nd
Message confidentiality
Message digests [See Cryptographic checksum.]
Message integrity
Method, opportunity, motive (MOM)
Methods of
    attack [See Attacks, methods.]
    defense [See Controls; Defense methods.]
Metropolitan area network (MAN)
MIC (message integrity check)
Microcontrollers in automobiles
Microcontrollers, automobile control systems
Microsoft
     on career criminals
     on full disclosure
     on passwords
     on product quality
     passport
     patching flaws
     single sign-on
Microsoft Redaction Tool
Microsoft Word, deleting text
Microwave networks
     description
     eavesdropping
     wiretapping
Military security policies
Mining, data [See Data mining.]
Misdelivering messages
Misuse intrusion detection
Mitnick, Kevin
Mix column
Mixmaster remailers
Mixter
Mobile agents
Mobile code
Model-based intrusion detection
Modeling security economics
     credibility
     decision making
     framing the issue
     group behavior
     overview
     role of organizational culture
     transferring models
     trust as economic issue
Models, security [See Security models.]
Modular arithmetic 2nd
Modularity of code
MOM (method, opportunity, motive)
Money, attack motive
Monitoring
     e-mail
     privacy
Monitors 2nd
Monoalphabetic cipher
Moore's Law
Morals [See Ethical issues.]
Morris, Robert, Jr. 2nd
Morris, Robert, Sr.
Motives for attacks
MP3.com
Multics 2nd 3rd
Multifactor authentication
Multilevel databases [See Databases, multilevel.]
Multilevel security
Multiple identities
Multiple virtual memory spaces
Multiplexed signals
Multiprogrammed operating systems
Mundie, Craig 2nd
Mutual authentication
Mutual suspicion




Security in Computing
Security in Computing, 4th Edition
ISBN: 0132390779
EAN: 2147483647
Year: 2006
Pages: 171

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net