Computer Security,Ethics and Privacy
by Job Nv
1. Computer Security Risks
1.1. The term hacker
1.2. A cracker
1.3. A script kiddie
2. Internet and Network Attacks
2.1. Computer Viruses,Worm and Trojan Horses
2.2. Botnet
2.3. Denial of Service Attacks
2.4. Back Doors
2.5. Safegruards against Botnets,Dos Attacks,Brack Doors and Spoofing
2.6. Firewalls
2.7. Intrusion Detection Software
2.8. Spoofing
2.9. Honeypots
3. Unauthorized Access And Use
3.1. Safeguards against Unauthorized Access and Use
3.2. Identifying and Authenticating Users
4. Hardware Theft And Vandalism
4.1. Safeguards against Hardware Theft and Vandalism
5. Information Theft
5.1. Safeguards against Information Theft Encryption
6. Software Theft
6.1. Safegurads against Software Theft
7. System Failure
7.1. Safeguards against System Failure
8. Backing Up-THe Ultimate Safeguard
9. Wireless Security
10. Ethics And Society
10.1. Information Accuracy
10.2. Intellectual Property Rights
10.3. Codes of Conduct
11. Information Privacy
11.1. Electronic Profiles
11.2. Cookies
11.3. Spyware and Adware
11.4. Spam
11.5. Phishing
11.6. Privacy Laws
11.7. Social Engineering
11.8. Employee Monitoring
11.9. Content Filtering
11.10. Computer Forensics
12. Health Concerns Of Computer Use
12.1. Computer and Health Risks
12.2. Ergonomics and Workplace Design
12.3. Computer Addiction
12.4. Green Computing
13. Chapter Summary
14. High-Tech Talk
14.1. The Key(s) to making Encryption Work
15. Companies On The Cutting Edge
15.1. McAfee
15.2. Symantec
16. Technology Trailblazers
16.1. Donn Parker
16.2. Clifford Stoll