Computer in Everyday Life Chapter 11

Get Started. It's Free
or sign up with your email address
Computer in Everyday Life Chapter 11 by Mind Map: Computer in Everyday Life Chapter 11

1. Internet and Network Attacks

1.1. Computer Virus

1.2. Worm

1.3. Trojan Horse

1.4. Rootkit

1.5. firewall

1.6. botnet

1.7. denial of service attack

1.8. back door

1.9. Spoofing

2. Computer Security Risks

2.1. Internet and network attacks

2.2. Unauthorized access and use

2.3. hardware theft

2.4. system failure

2.5. information theft

2.6. software theft

3. Unauthorized Access and Use

3.1. use of a computer or network without permission

3.2. use of a computer or its data for unapproved or possibly illegal activities

4. Hardware Theft and Vandalism

4.1. Physical access controls

4.2. Alarm systems

4.3. Cables to lock equipment

4.4. Real time location system

4.5. Passwords, possessed objects, and biometrics

5. Software Theft

5.1. Steals software media

5.2. Intentionally erases programs

5.3. Illegally copies a program

5.4. Illegally registers and/or activates a program

6. System Failure

6.1. System Failure

6.2. variety of factors

6.3. surge protectors and uninterruptable power supplies (UPS)

7. Information Theft

7.1. digital signature

7.2. Web browsers and Web sites use encryption techniques

7.3. Encryption

7.4. Popular security techniques include

7.4.1. Digital Certificates

7.4.2. Transport Layer Security (TLS)

7.4.3. Secure HTTP

7.4.4. VPN

8. Backing Up – The Ultimate Safeguard

8.1. backup

8.2. Offsite backups

8.3. Two categories of backups

8.3.1. Full backup

8.3.2. Selective backup

8.4. Three-generation backup policy

8.4.1. Grandparent

8.4.2. Parent

8.4.3. Child

9. Wireless Security

9.1. Wireless access poses additional security risks

9.2. War driving allows individuals to detect wireless networks while driving a vehicle through the area

9.3. In additional to using firewalls, some safeguards improve security of wireless networks

9.3.1. A wireless access point should not broadcast an SSID

9.3.2. Change the default SSID

9.3.3. Configure a WAP so that only certain devices can access it

9.3.4. Use WPA or WPA2 security standards

10. Health Concerns of Computer Use

10.1. The widespread use of computers has led to health concerns

10.2. Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

10.3. Computer addiction occurs when the computer consumes someone’s entire social life

10.4. Symptoms of users include

10.4.1. Craves computer time

10.4.2. Overjoy when at the computer

10.4.3. Unable to stop computer activity

10.4.4. Irritable when not at the computer

10.4.5. Neglects family and friends

10.4.6. Problems at work or school

11. Ethics and Society

11.1. Computer ethics are the moral guidelines that govern the use of computers and information systems

11.2. Information accuracy is a concern

11.3. Intellectual property rights

11.4. IT code of conduct

11.5. Green computing involves reducing the electricity and environmental waste while using a computer

11.6. Information privacy

11.7. Huge databases store data online

11.8. It is important to safeguard your information

11.9. A cookie is a small text file that a Web server stores on your computer

11.10. Web sites use cookies for a variety of reasons

11.10.1. Allow for personalization

11.10.2. Store users’ passwords

11.10.3. Assist with online shopping

11.10.4. Track how often users visit a site

11.10.5. Target advertisements

11.11. Spam

11.12. E-mail filtering

11.13. Anti-spam programs

11.14. Phishing

11.15. Pharming

11.16. Social engineering

11.17. Employee monitoring

11.18. Content filtering

11.19. Internet Content Rating Association (ICRA)

11.20. Web filtering software