Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Computer Security ,Safety ,Ethics and Privacy by Mind Map: Computer Security
,Safety ,Ethics and
4.5 stars - 2 reviews range from 0 to 5

Computer Security ,Safety ,Ethics and Privacy


Backing Up – The Ultimate Safeguard

a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed, Two categories of backups, Full backup, Selective backup

Wireless Security

In additional to using firewalls, some safeguards improve security of wireless networks, A wireless access point should not broadcast an SSID, Change the default SSID, Configure a WAP so that only certain devices can access it, Use WPA or WPA2 security standards

Health Concerns of Computer Use

The widespread use of computers has led to health concerns, Repetitive strain injury (RSI), Carpal tunnel syndrome (CTS), Computer vision syndrome (CVS)

Ergonomics, an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

Computer addiction, occurs when the computer consumes someone’s entire social life

Symptoms of users include, Craves computer time, Overjoy when at the computer, Unable to stop computer activity, Irritable when not at the computer, Neglects family and friends, Problems at work or school

Computer Security Risks

any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

Security risks, Unauthorized access and use, Organizations take several measures to help prevent unauthorized access and use, Acceptable use policy, Disable file and printer sharing, Firewalls, Intrusion detection software, Access controls define who can access a computer, when they can access it, and what actions they can take, Two-phase processes called identification and authentication, User name, Password, CAPTCHA, A possessed object is any item that you must carry to gain access to a computer or computer facility, Often are used incombination with a personal, A biometric device, authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer, Digital forensics, discovery, collection, and analysis of evidence found on computers and networks, Law enforcement, Criminal prosecutors, Military intelligence, Insurance agencies, Information security departments, Hardware theft, the act of stealing computer equipment, To help reduce the of chances of theft, companies and schools use a variety of security measures, Physical access controls, Alarm systems, Cables to lock equipment, Real time location system, Passwords, possessed objects, and biometrics, System failture, A variety of factors can lead to system failure, including, Aging hardware, Natural disasters, Electrical power problems, Noise, undervoltages, and overvoltages, Errors in computer programs, Two ways to protect from system failures caused by electrical power variations, surge protectors and uninterruptable power supplies (UPS), Information theft, occurs when someone steals personal or confidential information, Popular security techniques include, Digital Certificates, Transport Layer Security (TLS), Secure HTTP, VPN, Software theft, occurs when someone, Steals software media, Intentionally erases programs, Illegally copies a program, Illegally registers and/or activates a program

Internet and network attacks, Computer Virus, Affects a computer negatively byaltering the way the computer works, Worm, Copies itself repeatedly, using upresources and possibly shutting down the computer or network, Trojan Horse, A malicious program that hides within or looks like a legitimate program, Rootkit, Program that hides in a computer and allows someone from a remote location to take full control

Cybercrime, an online or Internet-based illegal act, Hackers, Crackers, Script Kiddies, Corporate Spies, Unethical Employees, Cyberextortionists, Cyberterrorists

An infected computer has one or more of the following symptoms

Operating system runs much slower than usual

Available memory is less than expected

Files become corrupted

Screen displays unusual message or image

Music or unusual sound plays randomly

Existing programs and files disappear

Programs or files do not work properly

Unknown programs or files mysteriously appear

System properties change

Operating system does not start up

Operating system shuts down unexpectedly


a group of compromised computers connected to a network, zombie

Denial of service attack (DoS attack)

disrupts computer access to Internet services

Back door

a program or set of instructions in a program that allow users to bypass security controls


a technique intruders use to make their network or Internet transmission appear legitimate

Ethics and Privacy

Computer ethics

are the moral guidelines that govern the use of computers and information systems

Information accuracy is a concern

Not all information on the Web is correct

Green computing

involves reducing the electricity and environmental waste while using a computer

Information privacy

refers to the right of individuals and companies to deny or restrict the collection and use of information about them

A cookie

a small text file that a Web server stores on your computer

Web sites use cookies for a variety of reasons

Allow for personalization

Store users’ passwords

Assist with online shopping

Track how often users visit a site

Target advertisements

Scam, Phishing, a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information, Pharming, a scam where a perpetrator attempts to obtain your personal and financial information via spoofing