Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] MAC (mandatory access control) MAC (Media Access Control) address Mafia boss case study Mafiaboy Magnetic remanence Malformed packets Malicious code [See also Nonmalicious errors; Programs, security; Viruses; Worms.] agents history of implementation time interface illusions keystroke logging logic bombs man-in-the-middle attacks potential for harm privilege escalation rabbits rootkit revealers rootkits Sony XCP (extended copy protection) rootkit spoofing threat assessment time bombs timing attacks Trojan horses types of 2nd worms zero day exploits Malware [See Malicious code.] MAN (metropolitan area network) Man-in-the-middle attacks 2nd [See also Impersonation; Masquerade; Spoofing.] Managers, security responsibilities Mandatory access control (MAC) Mapping controls to vulnerabilities 2nd Marginal cost Marketability, evaluating Marks, Leo MARS algorithm Masquerade [See also Man-in-the-middle ; Spoofing.] Mathematics of cryptography [See Cryptography.] MD4 hash function MD5 hash function Mean attacks Media Access Control (MAC) address Media, network Median attacks Mediation complete 2nd incomplete 2nd Memory and address protection base/bounds registers context switch fences page frames paging 2nd Palladium (protect memory project) principles of trusted systems 2nd relocation relocation factor segment address table segmentation 2nd tagged architecture Memory-resident viruses MerkleHellman knapsacks 2nd Message confidentiality Message digests [See Cryptographic checksum.] Message integrity Method, opportunity, motive (MOM) Methods of attack [See Attacks, methods.] defense [See Controls; Defense methods.] Metropolitan area network (MAN) MIC (message integrity check) Microcontrollers in automobiles Microcontrollers, automobile control systems Microsoft on career criminals on full disclosure on passwords on product quality passport patching flaws single sign-on Microsoft Redaction Tool Microsoft Word, deleting text Microwave networks description eavesdropping wiretapping Military security policies Mining, data [See Data mining.] Misdelivering messages Misuse intrusion detection Mitnick, Kevin Mix column Mixmaster remailers Mixter Mobile agents Mobile code Model-based intrusion detection Modeling security economics credibility decision making framing the issue group behavior overview role of organizational culture transferring models trust as economic issue Models, security [See Security models.] Modular arithmetic 2nd Modularity of code MOM (method, opportunity, motive) Money, attack motive Monitoring privacy Monitors 2nd Monoalphabetic cipher Moore's Law Morals [See Ethical issues.] Morris, Robert, Jr. 2nd Morris, Robert, Sr. Motives for attacks MP3.com Multics 2nd 3rd Multifactor authentication Multilevel databases [See Databases, multilevel.] Multilevel security Multiple identities Multiple virtual memory spaces Multiplexed signals Multiprogrammed operating systems Mundie, Craig 2nd Mutual authentication Mutual suspicion |