Chapter XI Computer Security And Privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Chapter XI Computer Security And Privacy by Mind Map: Chapter XI   Computer Security And Privacy

1. Computer Security Risk & Cyber Crime

1.1. Crackers

1.1.1. New node

1.2. Hackers

1.3. Script Kiddies

1.4. Corporate Spies

1.5. Unethical Employees

1.6. Cyberextortionists

1.7. Cyberterrorists

2. Internet and Network Attacks

2.1. Computer Virus

2.2. Trojan Horse

2.3. Worm

2.4. Rootkit

3. Hardware Theft and Vandalism

3.1. Physical access controls

3.2. Alarm systems

3.3. Cables to lock equipment

3.4. Real time location system

3.5. Password,possessed objects,and biometrics

4. Software Theft

4.1. Steals software media

4.2. Intentionally erases programs

4.3. illegally copies a program

4.4. illegally registers or actives a program

5. Wireless Security

5.1. A wireless access point should not broadcast an SSID

5.2. Change the default SSID

5.3. Configure a WAP so that only certain devices can access it

5.4. Use WPA or WPA2 security standards

6. Cookie

6.1. Web site use cookies for a variety of reasons

6.1.1. Allow for personalization

6.1.2. Store users passwords

6.1.3. Assist with online shopping

6.1.4. Track how often users visit a site

6.1.5. Target advertisements