Computer and Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer and Security by Mind Map: Computer and Security

1. Computer Security Risk

1.1. Cybercrime

1.1.1. Hackers

1.1.2. Crackers

1.1.3. Script Kiddies

1.1.4. Corporate Spies

1.1.5. Unethical Employee

1.1.6. Cyberextortionists

1.1.7. Cyberterrorists

1.2. Internet and Network Attacks

1.2.1. Online Security Service

1.2.2. Computer Virus

1.2.3. Worm

1.2.4. Trojan Horse

1.2.5. Rootkit

1.3. Unauthorize and Access User

1.3.1. Digital Forensics

1.4. Hardware Theft

1.4.1. Physical Access Control

1.4.2. Alarm System

1.4.3. Cable to Lock Equipment

1.4.4. Realtime Location System

1.4.5. Password,Possessed,Objectives and Biometric

1.5. Software Theft

1.5.1. Steal Software Media

1.5.2. Intentionally Eares Program

1.5.3. Illegal Copies a Programs

1.6. Information Theft

1.6.1. Encryption

1.7. System Failure

1.7.1. Aging Hardware

1.7.2. Natural Disaster

1.7.3. Electrical Power Problem

1.7.4. Error in Computer Programs

2. Wireless Security

2.1. Wireless access poses addition security risk

2.2. War driving individual to detect wireless

3. Health Concern of Computer Use

3.1. RSI

3.2. CTS

3.3. CVS

3.4. Ergonomic

3.4.1. Applied science devote to incoroperating comfort

3.5. Computer Addiction

3.5.1. Crave computer time

3.5.2. Overjoin when at the computer

3.5.3. Unable stopped computer activities

3.5.4. Irritable when not at the computer

3.5.5. Neglect family and friend

3.5.6. Peoblem at work or school

4. Ethics Society

4.1. Intellectual Property Right

4.2. IT Code of Conduct

4.3. Green Computing

4.4. Information Privacy

4.5. Cookies

4.5.1. Allow for personalization

4.5.2. Storage user password

4.5.3. Assist with online shopping

4.5.4. Track how often user visit a stie

4.5.5. Target advertisement

4.6. Spam

4.7. E-mail Filtering

4.8. Anti-spam Program

4.9. Phishing

4.10. Pharming