Get Started. It's Free
or sign up with your email address
Rocket clouds
Chapter 8 by Mind Map: Chapter 8

1. Dimensions of privacy

1.1. Psychological: to have a sense of control

1.2. Legal: to be able to protect yourself

2. Hardware key logger

2.1. hardware device that captures keystrokes moving between keyboard and motherboard

3. – the right to left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent

4. Ethics

4.1. the principles and standards that guide our behavior toward other people

5. Actions in ethical dilemmas determined by

5.1. Your basic ethical structure

5.1.1. Minor ethical violations

5.1.2. Serious ethical violations

5.1.3. Very serious ethical violations

5.2. The circumstances of the situation

5.2.1. Consequences

5.2.2. Society’s opinion

5.2.3. Time to consequences

5.2.4. Relatedness of people who will be affected

5.2.5. Reach of result

6. Intellectual Property

6.1. intangible creative work that is embodied in physical form

6.2. Copyright – legal protection afforded an expression of an idea

6.3. Fair Use Doctrine – may use copyrighted material in certain situations

6.4. Pirated software – the unauthorized use, duplication, distribution, or sale of copyrighted software


7.1. Key logger software

7.1.1. a program that, when installed on a computer, records every keystroke and mouse click

8. Identity Theft

8.1. the forging of someone’s identity for the purpose of fraud

8.2. Phishing

8.2.1. a technique to gain personal information for the purpose of identity theft

8.3. Spear phishing

8.3.1. targeted to specific individuals with something in common—they work at the same company, bank at the same financial institution, attend the same college

8.4. Whaling

8.4.1. targeted to senior business executives and government leaders

9. Pharming

9.1. rerouting your request for a legitimate Web site

9.1.1. sending it to a slightly different Web address

9.1.2. redirecting you after you are already on the legitimate site

9.2. Reasons for Monitoring

9.2.1. Hire the best people possible

9.2.2. Ensure appropriate behavior on the job

10. Cookie

10.1. – a small file that contains information about you and your Web activities, which a Web site places on your computer

10.2. Handle by using:

10.2.1. Web browser cookie management option

10.2.2. Buy a program that manages cookies

11. Spam

11.1. unsolicited e-mail from businesses advertising goods and servicesl

12. Adware

12.1. – software to generate ads that installs itself when you download another program

13. Spyware (sneakware, stealthware)

13.1. software that comes hidden in downloaded software and helps itself to your computer resources

14. Trojan horse software

14.1. software you don’t want inside software you do want

14.2. some way to detect

14.2.1. AdAware at

14.2.2. The Cleaner at

14.2.3. Trojan First Aid Kit (TFAK)

14.2.4. Check it out before you download

15. Web log

15.1. one line of information for every visitor to a Web site

16. Clickstream

16.1. records information about you such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.

17. Anonymous Web browsing (AWB)

17.1. hides your identity from the Web sites you visit

17.1.1. The Anonymizer at

17.1.2. SuftSecret at

18. Security and Outside Threats

18.1. Hackers – knowledgeable computer users who invade other people's computers

18.2. Computer virus (virus) – software that is written with malicious intent to cause annoyance or damage

18.3. Worm – virus that spreads itself from computer to computer usually via e-mail

18.4. Denial-of-service (DoS) attack – floods a Web site with so many requests for service that it slows down or crashes

19. Security Measures

19.1. Anti-virus software – detects and removes or quarantines computer viruses

19.2. Anti-spyware and anti-adware software Spam protection software – identifies and marks and/or deletes Spam

19.3. Anti-phishing software – lets you know when phishing attempts are being made

19.4. Firewall – hardware and/or software that protects a computer or network from intruders

19.5. Encryption – scrambles the contents of a file so that you can’t read it without the decryption key

19.6. Biometrics – the use of physiological characteristics for identification purposes