Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

Computer in Everyday Life Chapter 11 by Mind Map: Computer in Everyday Life Chapter 11
0.0 stars - reviews range from 0 to 5

Computer in Everyday Life Chapter 11

Internet and Network Attacks

Computer Virus


Trojan Horse




denial of service attack

back door


Computer Security Risks

Internet and network attacks

Unauthorized access and use

hardware theft

system failure

information theft

software theft

Unauthorized Access and Use

use of a computer or network without permission

use of a computer or its data for unapproved or possibly illegal activities

Hardware Theft and Vandalism

Physical access controls

Alarm systems

Cables to lock equipment

Real time location system

Passwords, possessed objects, and biometrics

Software Theft

Steals software media

Intentionally erases programs

Illegally copies a program

Illegally registers and/or activates a program

System Failure

System Failure

variety of factors

surge protectors and uninterruptable power supplies (UPS)

Information Theft

digital signature

Web browsers and Web sites use encryption techniques


Popular security techniques include

Backing Up – The Ultimate Safeguard


Offsite backups

Two categories of backups

Three-generation backup policy

Wireless Security

Wireless access poses additional security risks

War driving allows individuals to detect wireless networks while driving a vehicle through the area

In additional to using firewalls, some safeguards improve security of wireless networks

Health Concerns of Computer Use

The widespread use of computers has led to health concerns

Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

Computer addiction occurs when the computer consumes someone’s entire social life

Symptoms of users include

Ethics and Society

Computer ethics are the moral guidelines that govern the use of computers and information systems

Information accuracy is a concern

Intellectual property rights

IT code of conduct

Green computing involves reducing the electricity and environmental waste while using a computer

Information privacy

Huge databases store data online

It is important to safeguard your information

A cookie is a small text file that a Web server stores on your computer

Web sites use cookies for a variety of reasons


E-mail filtering

Anti-spam programs



Social engineering

Employee monitoring

Content filtering

Internet Content Rating Association (ICRA)

Web filtering software