Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Computer in Everyday Life Chapter 11 by Mind Map: Computer in Everyday Life
Chapter 11
0.0 stars - reviews range from 0 to 5

Computer in Everyday Life Chapter 11

Internet and Network Attacks

Computer Virus


Trojan Horse




denial of service attack

back door


Computer Security Risks

Internet and network attacks

Unauthorized access and use

hardware theft

system failure

information theft

software theft

Unauthorized Access and Use

use of a computer or network without permission

use of a computer or its data for unapproved or possibly illegal activities

Hardware Theft and Vandalism

Physical access controls

Alarm systems

Cables to lock equipment

Real time location system

Passwords, possessed objects, and biometrics

Software Theft

Steals software media

Intentionally erases programs

Illegally copies a program

Illegally registers and/or activates a program

System Failure

System Failure

variety of factors

surge protectors and uninterruptable power supplies (UPS)

Information Theft

digital signature

Web browsers and Web sites use encryption techniques


Popular security techniques include

Digital Certificates

Transport Layer Security (TLS)

Secure HTTP


Backing Up – The Ultimate Safeguard


Offsite backups

Two categories of backups

Full backup

Selective backup

Three-generation backup policy




Wireless Security

Wireless access poses additional security risks

War driving allows individuals to detect wireless networks while driving a vehicle through the area

In additional to using firewalls, some safeguards improve security of wireless networks

A wireless access point should not broadcast an SSID

Change the default SSID

Configure a WAP so that only certain devices can access it

Use WPA or WPA2 security standards

Health Concerns of Computer Use

The widespread use of computers has led to health concerns

Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

Computer addiction occurs when the computer consumes someone’s entire social life

Symptoms of users include

Craves computer time

Overjoy when at the computer

Unable to stop computer activity

Irritable when not at the computer

Neglects family and friends

Problems at work or school

Ethics and Society

Computer ethics are the moral guidelines that govern the use of computers and information systems

Information accuracy is a concern

Intellectual property rights

IT code of conduct

Green computing involves reducing the electricity and environmental waste while using a computer

Information privacy

Huge databases store data online

It is important to safeguard your information

A cookie is a small text file that a Web server stores on your computer

Web sites use cookies for a variety of reasons

Allow for personalization

Store users’ passwords

Assist with online shopping

Track how often users visit a site

Target advertisements


E-mail filtering

Anti-spam programs



Social engineering

Employee monitoring

Content filtering

Internet Content Rating Association (ICRA)

Web filtering software