Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Computer and Security by Mind Map: Computer and Security
0.0 stars - reviews range from 0 to 5

Computer and Security

Computer Security Risk

Cybercrime

Hackers

Crackers

Script Kiddies

Corporate Spies

Unethical Employee

Cyberextortionists

Cyberterrorists

Internet and Network Attacks

Online Security Service

Computer Virus

Worm

Trojan Horse

Rootkit

Unauthorize and Access User

Digital Forensics

Hardware Theft

Physical Access Control

Alarm System

Cable to Lock Equipment

Realtime Location System

Password,Possessed,Objectives and Biometric

Software Theft

Steal Software Media

Intentionally Eares Program

Illegal Copies a Programs

Information Theft

Encryption

System Failure

Aging Hardware

Natural Disaster

Electrical Power Problem

Error in Computer Programs

Wireless Security

Wireless access poses addition security risk

War driving individual to detect wireless

Health Concern of Computer Use

RSI

CTS

CVS

Ergonomic

Applied science devote to incoroperating comfort

Computer Addiction

Crave computer time

Overjoin when at the computer

Unable stopped computer activities

Irritable when not at the computer

Neglect family and friend

Peoblem at work or school

Ethics Society

Intellectual Property Right

IT Code of Conduct

Green Computing

Information Privacy

Cookies

Allow for personalization

Storage user password

Assist with online shopping

Track how often user visit a stie

Target advertisement

Spam

E-mail Filtering

Anti-spam Program

Phishing

Pharming