Computer Security and Safety,Ethics and Privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security and Safety,Ethics and Privacy by Mind Map: Computer Security and Safety,Ethics and Privacy

1. Information Privacy

1.1. Electronic Profiles

1.2. Cookies

1.3. Spam

1.4. Phishing

1.5. Spyware and Adware

1.6. Privacy Laws

1.7. Social Engineering

1.8. Employee Monitoring

1.9. Content Filtering

2. Ethics and Society

2.1. Computer ethics

2.2. Information Accuracy

2.3. Intellectual Property Rights

2.3.1. copyright

2.4. Codes of Conduct

2.5. Green Computing

3. Health Concerns of Computer Use

3.1. Computers and Health Risks

3.1.1. A repetitive strain injury (RSI)

3.2. Ergonomics and Workplace Design

3.3. Computer Addiction

4. Wireless Security

5. Backing Up-The Ultimate Safeguard

6. System Failure

6.1. Safeguards against System Failure

7. Information Theft

7.1. Safeguards against Information Theft

7.2. Encryption

7.3. Digital Certificates

7.4. Transport Layer Security

7.5. Secure HTTP

7.6. VPN

8. Software Theft

8.1. Safeguards against Software Theft

8.1.1. product activation

9. Hardware Theft and Vandalism

9.1. Safeguards againts Hardware Theft and Vandalism

10. Unauthorized Access and Use

10.1. Safeguards against Unauthorized Access and Use

10.2. Identifying and Authenticating Users

10.3. Possessed Objects

10.4. Biometric Devices

10.5. Digital Forensics

11. Internet and Network Attacks

11.1. Online security service

11.2. virus

11.3. worm

11.4. Trojan horse

11.5. rootkit

11.6. Safeguards aginst Computer Viruses and Other Malware

11.6.1. trusted source

11.6.2. antivirus program

11.6.3. virus signature

11.6.4. virus definition

11.6.5. inoculate

11.6.6. quarantine

11.6.7. virus hoax

11.7. Bothets

11.7.1. zombie

11.8. Denial of Service Attacks

11.9. Back Doors

11.10. Safeguards against Botnets,DoS/DDoS Attacks,Back Doors,and Spoofing

11.11. firewalls

11.12. Intrusion Detection Software

11.13. Honeypots

12. Computer Security Risks

12.1. computer crime

12.2. cybercrime

12.3. hacker

12.4. crcker

12.5. script kiddie

12.6. cyberextortionist

12.7. cyberterrorist