Computer Security and Safety,Ethics and Privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security and Safety,Ethics and Privacy by Mind Map: Computer Security and  Safety,Ethics and Privacy

1. ComputerSecurity Risk

1.1. Internet and Network Attack

1.1.1. Thread

1.1.1.1. Computer Virus

1.1.1.2. Worm

1.1.1.3. Trojan Horse

1.1.1.4. Rookit

1.1.1.5. Backdoor

1.1.1.6. Botnet

1.1.1.7. Denial of Service Attack

1.1.1.8. Spoofing

1.1.2. Prevention

1.1.2.1. Firewall

1.1.2.2. Intrusion Detection Software

1.1.2.3. Honeypot

1.2. unauthorized access and use

1.2.1. Access control

1.2.1.1. user

1.2.1.2. password

1.2.1.3. CAPTCHA

1.2.1.4. biometric

1.2.2. Digital forensics

1.2.2.1. Law enforcement

1.2.2.2. Criminal Prosecutor

1.2.2.3. Military Intelligence

1.2.2.4. Insurance agencies

1.2.2.5. Information Security Department

1.3. Hardware Thieft

1.3.1. Physical Access control

1.3.2. Alarm System

1.3.3. Cables to lock equipment

1.3.4. Real time location system

1.3.5. Password,possessed object ,biometric

1.4. Software theift

1.4.1. Steal software media

1.4.2. Intentionally erases programs

1.4.3. Illegally copies a program

1.4.4. Illegally register and/or activates a program

1.5. System Failure

1.5.1. Factor

1.5.1.1. Aging Hardware

1.5.1.2. Nature Disaster

1.5.1.3. Electrical Power Problem

1.5.1.3.1. Noise

1.5.1.3.2. Under Voltage

1.5.1.3.3. Over Voltage

1.5.1.4. Errors in computer program

1.5.2. Protection

1.5.2.1. Surge proctection

1.5.2.2. Uninterruptable Power System

1.5.2.3. Backup

1.5.2.3.1. Full Backup

1.5.2.3.2. Selective Backup

1.6. Information Theft

1.6.1. Encryption

1.6.2. Digital Signature

1.6.3. Security Techniques

1.6.3.1. Digital Certificates

1.6.3.2. Transport Layer Security

1.6.3.3. VPN

1.6.3.4. Secure HTTP

2. Health concerns of computer use

2.1. Repetitive Strain Injury(RSI)

2.2. Carpal tunnel syndrome(CTS)

2.3. Computer Vision syndrome(CVS)

2.4. Computer Addiction

3. Ethics and Socity

3.1. Green Computing

3.2. Information Privacy

3.3. Cookie

3.4. Spam

3.5. Phising

3.6. Pharming

3.7. Social Engineering

3.8. Employee monitoring

3.9. Content Filtering