Privacy, security, ethnic and ergonomic

Get Started. It's Free
or sign up with your email address
Privacy, security, ethnic and ergonomic by Mind Map: Privacy, security, ethnic and ergonomic

1. Unauthorised access and use

1.1. Access

1.1.1. The use of computer or network withoit permission

1.2. Use

1.2.1. The use of computer or its data foor unapproved or possibly illegal activities

2. Hardware theft and vandalism

2.1. Theft

2.1.1. Act of stealing computer equipment

2.1.1.1. Occurs when

2.1.1.1.1. Steals software media

2.1.1.1.2. Intentionally erased programs

2.1.1.1.3. Illegally copies a program

2.1.1.1.4. Illegally register or activate s a program

2.1.1.2. Information theft

2.1.1.2.1. When someone steals personal or confidential information

2.2. Vandalism

2.2.1. Act of destroying computer equipment

3. System failure

3.1. Prolonged malfunction of a computer

3.1.1. Because of

3.1.1.1. Aging hardware

3.1.1.2. Natural disaster

3.1.1.3. Electrical power problem

3.1.1.4. Error in computer programs

4. Summary

4.1. Potential computer risk amd safeguards

4.2. Wireless security risk and safeguards

4.3. Computer-related health issues and prevention

4.4. Ethical issue surrounding information accuracy, intellectual property rights, codes of conduct, green computing and information privacy

5. Hides in a computer and allow someone from a remote location to take a full action

6. Computer security risk

6.1. Any action or event that cause a loss or damage to the software, computer hardware or information

6.1.1. Hackers

6.1.2. Crackers

6.1.3. Script kiddies

6.1.4. Coporate spies

6.1.5. Unethical employees

6.1.6. Cyberextortionists

6.1.7. Cyberterrorist

7. Internet and network attack

7.1. Information that transmitter over network has a higher degree of security risk.

7.1.1. Computer virus

7.1.1.1. Affects a computer by altering the way the computer works

7.1.2. Worm

7.1.2.1. Copies itself repeatedly, using up the resources and shutting down computer

7.2. Online security service is a web that evaluates your computer to check for email etc.

7.2.1. Trojan horse

7.2.1.1. Program that hides within or look like a legitimate program

7.2.2. Rootkit

8. Ethics and society

8.1. Computer are the moral guidelines that used of information and computer system

8.2. Intellectual property rights

8.2.1. The right to which creators are entitled for their work

8.3. An it code helps determine whether the specific computer action is ethical or unethical

8.4. Green computing

8.4.1. Reducing the electricity and environment waste while using computer