Computer Security and Safety, Ethics, and Privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security and Safety, Ethics, and Privacy by Mind Map: Computer Security and Safety, Ethics, and Privacy

1. Computer Security Risks

1.1. Hackers

1.2. Cracker

1.3. Script kiddie

1.4. Corporate spy

1.5. Unethical

1.6. Employee

1.7. cyberextortionist, and cyberterrorist

2. Internet and Network Attacks

2.1. Viruses

2.2. worms

2.3. Trojan horse

2.4. Rootkits

2.5. Botnets

2.6. Denail of Service Attacks

2.7. Back Doors

2.8. Spoofing

2.9. Firewalls

2.10. Intrustion Detection Software

2.11. Honeypots

3. Unauthorized Access and Use

3.1. Safeguard agianst Unaythorized Access Use

3.2. Identify and Authenticating Users

3.3. Password and Username

3.4. Biometric Devices

3.5. Digital Forensics

4. Hardware Theft and Vandalism

5. Software Theft

6. Information Theft

6.1. Encrytion

6.2. Digital Certificates

6.3. Transport Layer Security

6.4. Secure HTTP

6.5. VPN

7. System Failure

8. Backing up - The Ultimate Safeguard

9. Wireless Security

10. Health Concerns of Computer Use

10.1. Computers and Health Risks

10.2. Ergonomics and Workplace Design

10.3. Computer Addiction

11. Ethics and Society

11.1. Information Accuracy

11.2. Intellectual Property Rights

11.3. Green Computing

11.4. Codes of Conduct

12. Information Privacy

12.1. Electronic Profiles

12.2. Cookies

12.3. Spam

12.4. Phishing

12.5. Spyware and Adware

12.6. Privacy Laws

12.7. Social Engineering

12.8. Employee Monitoring

12.9. Content Filtering