Computer Security and Safety, Ethics, and Privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
Computer Security and Safety, Ethics, and Privacy by Mind Map: Computer Security and Safety, Ethics, and Privacy

1. Objectives Overview

1.1. Discuss the types of devices available that project computers from system failure

2. Computer Security Risks

2.1. Hackers

2.2. Crackers

2.3. Script Kiddies

2.4. Corporate Spies

2.5. Unethical Employees

2.6. Cyberextortionists

2.7. Cyberterrorists

3. Internet and Network Attacks

3.1. Computer Virus

3.2. Worm

3.3. Rootkit

3.4. New node

4. Unauthorized Access and Use

4.1. Acceptable use policy

4.2. Disable file and printer sharing

4.3. Firewalls

4.4. Intrusion detection software

5. Hardware Theft and Vandalism

5.1. Physical access controls

5.2. Alarm systems

5.3. Cables to lock equipment

5.4. Real time location system

5.5. Passwords, possessed objects, and biometrics

6. Software Theft

6.1. Steals software media

6.2. Intentionally erases programs

6.3. Illegally copies a program

6.4. Illegally registers and/or actives a progam

7. Information Theft

7.1. Digital Certificates

7.2. Transport Layer Security (TLS)

7.3. Secure HTTP

7.4. VPN

8. System Failure

8.1. Aging hardware

8.2. Natural disasters

8.3. Electrical power problems

8.4. Errors in computer programs

9. Backing Up - The Ultimate Safeguard

9.1. Full backup

9.2. Selective backup

10. Wireless Security

10.1. shouldn't broadcast an SSID

10.2. change the default SSID

10.3. Configure a WAP

10.4. use WPA or WPA2

11. Health Concerns of Computer Use

11.1. RSI

11.2. CTS

11.3. CVS

12. Ethics and Society

12.1. Allow for personalization

12.2. Store users' passwords

12.3. Assist with online shopping

12.4. Tack how often users visit a site

12.5. Target advertisements

13. Summary

13.1. Potential computer risks and the safeguards

13.2. Wireless security risks and safeguards

13.3. computer-related

13.4. preventions