Computer Security,Ethics and Privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security,Ethics and Privacy by Mind Map: Computer Security,Ethics and Privacy

1. Unauthorized Access And Use

1.1. Safeguards against Unauthorized Access and Use

1.2. Identifying and Authenticating Users

2. Computer Security Risks

2.1. The term hacker

2.2. A cracker

2.3. A script kiddie

3. Internet and Network Attacks

3.1. Computer Viruses,Worm and Trojan Horses

3.2. Botnet

3.3. Denial of Service Attacks

3.4. Back Doors

3.5. Safegruards against Botnets,Dos Attacks,Brack Doors and Spoofing

3.6. Firewalls

3.7. Intrusion Detection Software

3.8. Spoofing

3.9. Honeypots

4. Hardware Theft And Vandalism

4.1. Safeguards against Hardware Theft and Vandalism

5. Information Theft

5.1. Safeguards against Information Theft Encryption

6. Software Theft

6.1. Safegurads against Software Theft

7. System Failure

7.1. Safeguards against System Failure

8. Backing Up-THe Ultimate Safeguard

9. Wireless Security

10. Ethics And Society

10.1. Information Accuracy

10.2. Intellectual Property Rights

10.3. Codes of Conduct

11. Information Privacy

11.1. Electronic Profiles

11.2. Cookies

11.3. Spyware and Adware

11.4. Spam

11.5. Phishing

11.6. Privacy Laws

11.7. Social Engineering

11.8. Employee Monitoring

11.9. Content Filtering

11.10. Computer Forensics

12. Health Concerns Of Computer Use

12.1. Computer and Health Risks

12.2. Ergonomics and Workplace Design

12.3. Computer Addiction

12.4. Green Computing

13. Chapter Summary

14. High-Tech Talk

14.1. The Key(s) to making Encryption Work

15. Companies On The Cutting Edge

15.1. McAfee

15.2. Symantec

16. Technology Trailblazers

16.1. Donn Parker

16.2. Clifford Stoll