Computer Security and Safety,Ethics,and Privasy

Just an initial demo map, so that you don't start with an empty map list ...

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security and Safety,Ethics,and Privasy by Mind Map: Computer Security and Safety,Ethics,and Privasy

1. HARDWARE THEFT AND VANDALISM

1.1. Safeguards againnst Hardware Theft and Vandalism

2. UNAUTHORIZED ACCESS AND USE

2.1. Safeguards against Unauthorized Access and Use

2.2. Identifying and Authenticating Users

2.3. Digital Forensics

3. INTERNET AND NETWORK ATTACKS

3.1. Computer Viruses,Worms,Trojan Horses,and Rootkits

3.2. Safeguards against Computer Viruses and Other Malware

3.3. Botnets

3.4. Denial of Service Attacks

3.5. Back Doors

3.6. Spoofing

3.7. Saftguards against Botnets,Dos/DDos Attacks,Back Doors,and Spoofing

3.8. Firewalls

3.9. Intrusion Detection Software

3.10. Honeypots

4. INFORMATION PRIVACY

4.1. Electronic Profiles

4.2. Cookies

4.3. Spam

4.4. Phishing

4.5. Spyware and Adware

4.6. Privacy Laws

4.7. Social Engineering

4.8. Employee Monitoring

4.9. Content Filtering

5. INFORMATION THEFT

5.1. Safeguards againts Information Theft

5.2. Encryption

6. BACKING UP-THE ULTIMATE SAFEGUARD

7. WIRELESS SECUURITY

8. HEALTH CONCERNS OF COMPUTER USE

8.1. Computers and Health Risks

8.2. Ergonomics and Workplace Design

8.3. Computer Addiction

9. CHAPTER SUMMARY

10. ETHICS AND SOCIETY

10.1. Information Accuracy

10.2. Intellectual Property Rights

10.3. Codes of conduct

10.4. Green Computing

11. HIGH-TECH TALK

11.1. Encryption Algorithms:The Brains behind Encryption

12. COMPANIES ON THE CUTTING EDGE

12.1. Mcafee

12.2. Symantec

13. TECHNOLOGY TRAILBLAZERS

13.1. Richard Stallman