Computer Security and Safety,Ethics,and privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security and Safety,Ethics,and privacy by Mind Map: Computer Security and Safety,Ethics,and privacy

1. Unauthorized Access and Use

1.1. Digital forensics

2. Internet and Network Attacks

2.1. A firewall

3. Internet and Network Attacks

3.1. Intrusion softwere

3.1.1. Analyzes all network traffic

3.1.2. Assesses system vulnerabilies

3.1.3. Identifies any unauthorized intrusions

3.1.4. Notifies network administrators of suspicious behavior patterns or security breaches

3.2. Honeypot

3.2.1. Vulnerable computer that is set up to entice an intruder to break into it

4. Internet and Network Attacks

4.1. A botnet

4.2. A denial of service attack(Dos attack)

4.3. A back door

4.4. Spoofing

5. Internet and Network Attacks

5.1. Users can take several precautions to protect their home

6. Internet and Network Attacks

6.1. An infected computer has one or more of the following symptom

7. Internet and Network Attacks

7.1. Online security

8. Objectives Overview

8.1. New node

9. Computer Security Risks

9.1. Computer security risk

9.2. Cybercrime

9.2.1. Hackers

9.2.2. Crackers

9.2.3. Script Kiddies

9.2.4. Corporate Spies

9.2.5. Unethical Employees

9.2.6. Cyberextortionists

9.2.7. Cyberterrorists

9.2.7.1. New node

10. Internet and Network Attacks

10.1. Computer Virus

10.2. Worm

10.3. Trojan Horse

10.4. Rootkit

11. Unauthorized Access and Use

11.1. New node

12. Hardware Theft and Vandalism

12.1. Software Theft

13. System Failure

13.1. New node

14. Information Theft

14.1. New node