Computer in Everyday Life Chapter 11

Get Started. It's Free
or sign up with your email address
Computer in Everyday Life Chapter 11 by Mind Map: Computer in Everyday Life Chapter 11

1. System Failure

1.1. System Failure

1.2. variety of factors

1.3. surge protectors and uninterruptable power supplies (UPS)

2. Information Theft

2.1. digital signature

2.2. Web browsers and Web sites use encryption techniques

2.3. Encryption

2.4. Popular security techniques include

2.4.1. Digital Certificates

2.4.2. Transport Layer Security (TLS)

2.4.3. Secure HTTP

2.4.4. VPN

3. Backing Up – The Ultimate Safeguard

3.1. backup

3.2. Offsite backups

3.3. Two categories of backups

3.3.1. Full backup

3.3.2. Selective backup

3.4. Three-generation backup policy

3.4.1. Grandparent

3.4.2. Parent

3.4.3. Child

4. Wireless Security

4.1. Wireless access poses additional security risks

4.2. War driving allows individuals to detect wireless networks while driving a vehicle through the area

4.3. In additional to using firewalls, some safeguards improve security of wireless networks

4.3.1. A wireless access point should not broadcast an SSID

4.3.2. Change the default SSID

4.3.3. Configure a WAP so that only certain devices can access it

4.3.4. Use WPA or WPA2 security standards

5. Health Concerns of Computer Use

5.1. The widespread use of computers has led to health concerns

5.2. Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

5.3. Computer addiction occurs when the computer consumes someone’s entire social life

5.4. Symptoms of users include

5.4.1. Craves computer time

5.4.2. Overjoy when at the computer

5.4.3. Unable to stop computer activity

5.4.4. Irritable when not at the computer

5.4.5. Neglects family and friends

5.4.6. Problems at work or school

6. Ethics and Society

6.1. Computer ethics are the moral guidelines that govern the use of computers and information systems

6.2. Information accuracy is a concern

6.3. Intellectual property rights

6.4. IT code of conduct

6.5. Green computing involves reducing the electricity and environmental waste while using a computer

6.6. Information privacy

6.7. Huge databases store data online

6.8. It is important to safeguard your information

6.9. A cookie is a small text file that a Web server stores on your computer

6.10. Web sites use cookies for a variety of reasons

6.10.1. Allow for personalization

6.10.2. Store users’ passwords

6.10.3. Assist with online shopping

6.10.4. Track how often users visit a site

6.10.5. Target advertisements

6.11. Spam

6.12. E-mail filtering

6.13. Anti-spam programs

6.14. Phishing

6.15. Pharming

6.16. Social engineering

6.17. Employee monitoring

6.18. Content filtering

6.19. Internet Content Rating Association (ICRA)

6.20. Web filtering software

7. Internet and Network Attacks

7.1. Computer Virus

7.2. Worm

7.3. Trojan Horse

7.4. Rootkit

7.5. firewall

7.6. botnet

7.7. denial of service attack

7.8. back door

7.9. Spoofing

8. Computer Security Risks

8.1. Internet and network attacks

8.2. Unauthorized access and use

8.3. hardware theft

8.4. system failure

8.5. information theft

8.6. software theft

9. Unauthorized Access and Use

9.1. use of a computer or network without permission

9.2. use of a computer or its data for unapproved or possibly illegal activities

10. Hardware Theft and Vandalism

10.1. Physical access controls

10.2. Alarm systems

10.3. Cables to lock equipment

10.4. Real time location system

10.5. Passwords, possessed objects, and biometrics

11. Software Theft

11.1. Steals software media

11.2. Intentionally erases programs

11.3. Illegally copies a program

11.4. Illegally registers and/or activates a program