Computer Security and Safety,Ethics,and Privasy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security and Safety,Ethics,and Privasy by Mind Map: Computer Security  and Safety,Ethics,and Privasy

1. INFORMATION PRIVACY

1.1. Electronic Profiles

1.2. Cookies

1.3. Spam

1.4. Phishing

1.5. Spyware and Adware

1.6. Privacy Laws

1.7. Social Engineering

1.8. Employee Monitoring

1.9. Content Filtering

2. New node

3. INTERNET AND NETWORK ATTACKS

3.1. Computer Viruses,Worms,Trojan Horses,and Rootkits

3.2. Safeguards against Computer Viruses and Other Malware

3.3. Botnets

3.4. Denial of Service Attacks

3.5. Back Doors

3.6. Spoofing

3.7. Saftguards against Botnets,Dos/DDos Attacks,Back Doors,and Spoofing

3.8. Firewalls

3.9. Intrusion Detection Software

3.10. Honeypots

4. ETHICS AND SOCIETY

4.1. Information Accuracy

4.2. Intellectual Property Rights

4.3. Codes of conduct

4.4. Green Computing

5. TECHNOLOGY TRAILBLAZERS

5.1. Richard Stallman

6. COMPANIES ON THE CUTTING EDGE

6.1. Mcafee

6.2. Symantec

7. WIRELESS SECURITY

8. HEALTH CONCERNS OF COMPUTER USE

9. UNAUTHORIZED ACCESS AND USE

9.1. Safeguards against Unauthorized Access and Use

9.2. New node

9.3. Identifying and Authenticating Users

10. CHAPTER SUMMARY

11. HARDWARE THEFT AND VANDALISM

11.1. Safeguards againnst Hardware Theft and Vandalism

12. INFORMATION THEFT

13. HIGH-TECH TALK

14. BACKING UP-THE ULTIMATE SAFEGUARD