| < Free Open Study > |
|
Machine language, 284, 292, 298
MAC (Mandatory Access Control), 30-31, 43, 44
Macro viruses, 254, 335-336, 352
Mailer and mass-mailer worms, 339, 343-344, 358
Malicious code. See Logic bombs; Trojan Horses; Viruses; Worms
Malware, 338, 352
Management, defined, 221
Mandatory Access Control (MAC), 30-31, 43, 44
Man-in-the-middle attacks, 38, 79
MARS algorithm, 159
MD5 hash algorithm, 165, 184
Md5sum. See Hash algorithms and hashes
Means for crimes, 318, 320, 326
Media, removable, 145, 239-240
backups and disaster recovery, 203-205, 234, 239-240
CD-R optical storage disks, 109
destruction of, 213-214, 242
diskettes, 110
flash cards, 111
hard drives, 109-110
smart cards, 111
storage of, 198, 205-207
tapes, types of, 108
Melissa virus, 342, 353
Memory
process isolation and, 286-287
see also Media, removable; Storage
Memory cards, 111
Memory tokens, 24
Mesh topology, 102
Message digests. See Hash algorithms and hashes
Message padding, 164
Metadata, 265, 291
Microsoft
ActiveX technology, 73-74
MSDN Web site, 26
'Ten Immutable Laws of Security,' 23
troubleshooting active content, 73-74
Microsoft Windows NT/2000 DAC, 29-30
Mining, data and Web mining, 268-270, 292, 296
MLS (Multilevel Security), 272-273
Modems, 57
Modes of operation, 289-290
Modulus, 161
M of n control, 178, 183, 188-189
Motives for crimes, 317, 320, 326
MSDN Web site, 26
Multicast addressing, 113
Multi-factor authentication, 44-45
Multihome servers, 137
Multilevel Security (MLS), 272-273
Multiplexing, 135
Multipoint (multidrop) connections, 116
Mutual authentication, 45
| < Free Open Study > |
|