Create your own awesome maps

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account?
Log In

Computer Security and Safety,Ethics,and Privacy by Mind Map: Computer Security
and Safety,Ethics,and
Privacy
0.0 stars - reviews range from 0 to 5

Computer Security and Safety,Ethics,and Privacy

Objectives Overview

Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators

New node

Describe various types of internet and network attacks, and identify ways to safeguard against these these attacks

Discuss techniques to prevent unauthorized computer access and use

Identify safeguards against hardware theft and vandalism

Explain the ways software manufacturers protect against hardware theft and vandalism

Discuss how encryption works, and explain why it is necessary

Discuss the types of devices available that protect computers from system failure

Explain the options available for backing up computer resources

Identify risks and safeguards associated with wireless communications

Discuss issues surrounding information privacy

Computer Security Risks

Hackers

Crackers

Script Kiddidies

Corporate Spies

Cyberextortionists

Cyberterrorists

Internet and network attacks

information transmitted over networks has a higher degree of security risk than information kept on an organization's premises

an online security service is a web site that evaluates your computer to check for internet and e-mail vulnerabilities

an infected computer has one or more of the following symptoms

a botnet is a group of compromised computers connected to a network

a back door is a program or set of instructions in a program that allow users to bypass security controls

a firewall is hardware and/or software that protects resources from intrusion

Unauthorized access and use

law enforcement

Criminal prosecutors

Military intelligence

insurance agencies

Iformation security departments

Software theft

intentionally erases programs

steals software media

illegally copies a program

Hardware theft and vandalism

informaion theft

System Failure

wireless security

backing up - the ulitimate safeguaed

Health concerns of computer use

Ethics and society

Summary