Computer Security and Safety, Ethics,and Privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security and Safety, Ethics,and Privacy by Mind Map: Computer Security and Safety, Ethics,and Privacy

1. Computer Security Risks

1.1. New node

2. lnternet and Network Attacks

2.1. Safeguards against Computer Viruses and Other Malware

2.2. Botnets

2.3. Denial of Service Attacks

2.4. Back Doors

2.5. Spoofing

2.6. Safeguards against Botnets,Dos/DDoS Attacks,Back Doors, and Spoofing

2.7. Firewalls

2.8. lntrusion Detecion Software

2.9. Honeypots

3. Hardware Theft and Vandalism

3.1. Hardware theft

3.2. Hardware vandalism

4. Unauthorized Access and Use

4.1. Safeguards against Unauthorized Access and Use

4.1.1. Unauthorized access

4.1.2. Unauthorized use

4.2. ldentifying and Authenticating Users

4.2.1. User Names and Passwords

4.2.2. password

4.2.3. Possessed Objects

4.2.3.1. personal identification number(PIN)

4.2.4. Biometric Devices

4.3. Digital Forensics

5. Software Theft

5.1. Safeguards against Software Theft

6. lnformation Theft

6.1. Safeguards against lnformation Theft

6.2. Encryption

6.2.1. Digital Certificates

6.2.2. Transport layer Security

6.2.3. Secure HITP

6.2.4. VPN

7. System Failure

7.1. Safeguards against system Failure

7.1.1. uninterruptible power supply(UPS)

8. Backing Up-The Ultimate Safeguard

9. Wireless Security

10. Health Concerns of Computer Use

10.1. Computer and Health Risks

10.2. Ergonomics and Workplace Design

10.3. Computer Addiction

11. Ethics and Society

11.1. lnformation Accuracy

11.2. lntellectual Proerty Rights

11.3. Green Computing

12. lnformation Privacy

12.1. Electronic Profiles

12.2. Cookies

12.3. Spam

12.4. Phishing

12.5. Spyware and Adware

12.6. Privacy Laws

12.7. Social Engineering

12.8. Employee Monitoring

12.9. Content Filtering