Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Chapter XI Computer Security And Privacy by Mind Map: Chapter XI   Computer Security And
Privacy
0.0 stars - 0 reviews range from 0 to 5

Chapter XI Computer Security And Privacy

Computer Security Risk & Cyber Crime

Crackers

New node

Hackers

Script Kiddies

Corporate Spies

Unethical Employees

Cyberextortionists

Cyberterrorists

Internet and Network Attacks

Computer Virus

Trojan Horse

Worm

Rootkit

Hardware Theft and Vandalism

Physical access controls

Alarm systems

Cables to lock equipment

Real time location system

Password,possessed objects,and biometrics

Software Theft

Steals software media

Intentionally erases programs

illegally copies a program

illegally registers or actives a program

Wireless Security

A wireless access point should not broadcast an SSID

Change the default SSID

Configure a WAP so that only certain devices can access it

Use WPA or WPA2 security standards

Cookie

Web site use cookies for a variety of reasons

Allow for personalization

Store users passwords

Assist with online shopping

Track how often users visit a site

Target advertisements