Computer Security and Safety,Ethics,and Privasy
by tossaporn malaivichit
1. INFORMATION PRIVACY
1.1. Electronic Profiles
1.2. Cookies
1.3. Spam
1.4. Phishing
1.5. Spyware and Adware
1.6. Privacy Laws
1.7. Social Engineering
1.8. Employee Monitoring
1.9. Content Filtering
2. New node
3. INTERNET AND NETWORK ATTACKS
3.1. Computer Viruses,Worms,Trojan Horses,and Rootkits
3.2. Safeguards against Computer Viruses and Other Malware
3.3. Botnets
3.4. Denial of Service Attacks
3.5. Back Doors
3.6. Spoofing
3.7. Saftguards against Botnets,Dos/DDos Attacks,Back Doors,and Spoofing
3.8. Firewalls
3.9. Intrusion Detection Software
3.10. Honeypots
4. ETHICS AND SOCIETY
4.1. Information Accuracy
4.2. Intellectual Property Rights
4.3. Codes of conduct
4.4. Green Computing
5. TECHNOLOGY TRAILBLAZERS
5.1. Richard Stallman
6. COMPANIES ON THE CUTTING EDGE
6.1. Mcafee
6.2. Symantec
7. WIRELESS SECURITY
8. HEALTH CONCERNS OF COMPUTER USE
9. UNAUTHORIZED ACCESS AND USE
9.1. Safeguards against Unauthorized Access and Use
9.2. New node
9.3. Identifying and Authenticating Users
10. CHAPTER SUMMARY
11. HARDWARE THEFT AND VANDALISM
11.1. Safeguards againnst Hardware Theft and Vandalism
12. INFORMATION THEFT
13. HIGH-TECH TALK
14. BACKING UP-THE ULTIMATE SAFEGUARD