Computer Security and Safety, Ethics, and Privacy
by bell gp
1. Computer Security Risks
1.1. Hackers
1.2. Cracker
1.3. Script kiddie
1.4. Corporate spy
1.5. Unethical
1.6. Employee
1.7. cyberextortionist, and cyberterrorist
2. Internet and Network Attacks
2.1. Viruses
2.2. worms
2.3. Trojan horse
2.4. Rootkits
2.5. Botnets
2.6. Denail of Service Attacks
2.7. Back Doors
2.8. Spoofing
2.9. Firewalls
2.10. Intrustion Detection Software
2.11. Honeypots
3. Unauthorized Access and Use
3.1. Safeguard agianst Unaythorized Access Use
3.2. Identify and Authenticating Users
3.3. Password and Username
3.4. Biometric Devices
3.5. Digital Forensics
4. Hardware Theft and Vandalism
5. Software Theft
6. Information Theft
6.1. Encrytion
6.2. Digital Certificates
6.3. Transport Layer Security
6.4. Secure HTTP
6.5. VPN
7. System Failure
8. Backing up - The Ultimate Safeguard
9. Wireless Security
10. Health Concerns of Computer Use
10.1. Computers and Health Risks
10.2. Ergonomics and Workplace Design
10.3. Computer Addiction
11. Ethics and Society
11.1. Information Accuracy
11.2. Intellectual Property Rights
11.3. Green Computing
11.4. Codes of Conduct
12. Information Privacy
12.1. Electronic Profiles
12.2. Cookies
12.3. Spam
12.4. Phishing
12.5. Spyware and Adware
12.6. Privacy Laws
12.7. Social Engineering
12.8. Employee Monitoring
12.9. Content Filtering