computer Securit and Safety,Ethics,and Privacy

Get Started. It's Free
or sign up with your email address
Rocket clouds
computer Securit and Safety,Ethics,and Privacy by Mind Map: computer Securit and Safety,Ethics,and Privacy

1. Internet and Network Attacks

1.1. Computer Virus

1.2. Worm

1.3. Trojan Horse

1.4. Rootkit

2. Computer Security Risks

2.1. Hacker

2.2. Cracker

2.3. Script Kiddies

2.4. Corporate Spies

2.5. Unethical Employees

2.6. Cyberextortionists

2.7. Cyberterrorists

3. Objectives Overview

4. Unauthorized Access and Use

4.1. Law enforcement

4.2. Criminal prosecutors

4.3. Military intelligence

4.4. Insurance agencies

4.5. Information security depatments

5. Hardware Theft and Vandalism

5.1. Physical access controls

5.2. Alarm systems

5.3. Cables to lock equipment

5.4. Real time location system

5.5. Passwords,possessed objects,and biometrics

6. Software Theft

6.1. Steals software media

6.2. Intentionally erases programs

6.3. Illeglly copies a program

6.4. Illegally registers and/or activates a program

7. Information Theft

7.1. Encryption

7.2. A digital signture

7.3. Web browsers and Web sites use encryption techniques

7.4. popular security techniques include

7.4.1. Digital Certificates

7.4.2. Transport Layer Security (TLS)

7.4.3. Secure HTTP

7.4.4. VPS

8. System Failure

8.1. A system failure is the prolonged malfunction of a computer

8.2. A variety of factors can lead to system failure,including

8.2.1. Aging hardware

8.2.2. Natural disasters

8.2.3. Electrical power problems

8.2.4. UPS

9. Backing Up-The Ultimate Safeguard

10. Wireless Security

11. Health Concerns of Computer Use

12. Ethics and Society

13. Summary

13.1. Potential computer risks and the safeguards

13.2. Wireless security risks and safeguards

13.3. computer-related health issues and preventions

13.4. Ethical issues surrounding information accuracy,intellectual property rights,codes of conduct,green computing,and information privacy