Chapter 11 Computer Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Chapter 11 Computer Security by Mind Map: Chapter 11 Computer Security

1. Computer Risks

1.1. Hardware

1.1.1. Theft

1.1.2. Accident

1.2. Software

1.2.1. Cybercrime

1.2.1.1. Hacker

1.2.1.2. Cracker

1.2.1.3. Script Kiddie

1.2.1.4. Cyberterrorist

1.2.2. Malware

1.2.2.1. Virus

1.2.2.2. Worm

1.2.2.3. Troian

1.2.2.4. Spyware

1.2.2.5. Phishing

1.2.2.6. Zombie Network

1.2.2.7. Keylogger

1.2.2.8. Dialer

1.2.2.9. Hybrid Malware

2. Computer Safety

2.1. Hardware

2.1.1. Protect Theft

2.1.1.1. Real time location system

2.1.1.2. Lock

2.1.2. Accessory

2.1.2.1. Soft Case

2.1.2.2. Air Cooling

2.1.2.3. UPS

2.2. Software

2.2.1. Protect Information

2.2.1.1. Encryption

2.2.1.2. Change Password

2.2.1.3. Lock file

2.2.2. Antivirus Programs

2.2.2.1. McAfee

2.2.2.2. Norton

2.2.2.3. Avira

2.2.2.4. AVG

2.2.2.5. Kaspersky

2.2.3. Honeypots

2.2.3.1. Research Honeypot

2.2.3.2. Production Honeypot

2.2.4. Back up