M


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Macintosh
     applications as single icons, displaying
     email access, securing
     email attachment viruses, eliminating main propagation method of
     file access, securing
     OS 10.3, user interface error
     viruses/worms
MailFrontier, study of phishing attack success
mailing lists, as security administration tool
Mainwaring, Scott D.
malware
     file changes
man-in-the-middle attacks
manipulation, as criterion of informed consent
Marsh, Steve
Martin, David
Mathewson, Nick
meaningfulness, authentication memorability
     authentication keys
medium-fidelity prototypes of user interface
Melissa virus
memometric authentication 2nd
memorability
     aspects of
    criterion for evaluating
         authentication
         challenge questions systems
     graphical passwords
         order of images
         picture effect and
         user-selected
     memory as human factor
     methods of remembering
     mnemonic-based passwords
     passwords
     recognition and
     security and, tradeoff in password selection
     uncued recall
message boards, web bugs and
messages
    encrypting
         IBM Lotus Notes/Domino
         PGP v5.0, usability evaluation
         user reluctance
     forged
     retrieving, phishing attack defense
     user feedback in postrelease, analyzing
Microsoft
     users and trust
     users, researching
Microsoft Internet Explorer
     consent dialogs
     extensibility of, Bugnosis user interface
     file download dialogs
     remote software installation
     SpoofGuard
     spoofing identification cues
     version 5, Privacy Bird add-on
    version 6
         P3P functionality in
         peripheral awareness system
         Privacy Bird add-on
Microsoft SQL Server
    passwords and
         SQLSnake/Spida worm
     Slammer worm
     SQLSnake/Spida worm
Microsoft Word
     Melissa virus
Miller, Robert
MIME (Multipurpose Internet Mail Extensions)
minimal distraction, informed consent model
mirror sites, phishing and
Mixmaster networks
Mixminion network
mMode Find People Nearby service (AT&T), information flow, obscuring
mnemonic-based passwords
     difficulty of cracking
     memorability of
monitoring 2nd
     application for biometric authentication
     data mining and
     intrusion detection systems 2nd
     local drives, tools for
     minimizing attacks by
     networks
         in real time
         log analysis 2nd
         scan reports, analyzing
     surveillance and, applications for keystroke authentication
     web logs, scanning 2nd
     with code samples
Monrose, Fabian
MOO (Object Oriented MUDMultiple User Dialog), as security administration tool 2nd 3rd
Moromisa, George
Moskowitz, Courtney
MoTEC model of trust
Mozilla Firefox
     Cookie Manager tool, redesign
     file access options
     version 1.73, peripheral awareness system
Mozilla Foundation
Multics operating system, internal security between users
Multipurpose Internet Mail Extensions (MIME)
MyDoom virus
     case study of
     signature detection in web logs
Mynatt, Elizabeth D.



Security and Usability. Designing Secure Systems that People Can Use
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 0596008279
EAN: 2147483647
Year: 2004
Pages: 295

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net