Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Computer Security and Safety,Ethics,and Privacy by Mind Map: Computer Security and Safety,Ethics,and Privacy
0.0 stars - 0 reviews range from 0 to 5

Computer Security and Safety,Ethics,and Privacy

Objectives Overview

Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators

Describe various types of Internet and network attacks, and identify ways to safeguard against these attacks

Discuss techniques to prevent unauthorized computer access and use

Identify safeguards against hardware theft and vandalism

Explain the ways software manufacturers protect against software piracy

Discuss how encryption works, and explain why it is necessary

Computer Security Risks



Script Kiddies

Corporate Spies

Unethical Employees



Internet and Network Attacks

Operating system runs much slower than usual

Available memory is less than expected

Files become corrupted

Screen displays unusual message or image

Music or unusual sound plays randomly

Existing programs and files disappear

Programs or files do not work properly

Unknown programs or files mysteriously appear

System properties change

Operating system does not start up

Operating system shuts down unexpectedly

Unauthorized Access and Use

Unauthorized access is the use of a computer or network without permission

Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities

Hardware Theft and Vandalism

Physical access controls

Alarm systems

Cables to lock equipment

Real time location system

Passwords, possessed objects, and biometrics

Information Theft

Digital Certificates

Transport Layer Security (TLS)

Secure HTTP


Wireless Security

A wireless access point should not broadcast an SSID

Change the default SSID

Configure a WAP so that only certain devices can access it

Use WPA or WPA2 security standards

Health Concerns of Computer Use

Craves computer time

Overjoy when at the computer

Unable to stop computer activity

Irritable when not at the computer

Neglects family and friends

Problems at work or school

Ethics and Society

Allow for personalization

Store users’ passwords

Assist with online shopping

Track how often users visit a site

Target advertisements


Potential computer risks and the safeguards

Wireless security risks and safeguards

Computer-related health issues and preventions

Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, green computing, and information privacy