Frigør det fulde potentiale i dine projekter.
Prøv MeisterTask gratis.
Har du ingen konto?
Tilmeld dig Gratis
Brows
Fremhævede Maps
Kategorier
Projektledelse
Forretning og mål
Menneskelige ressourcer
Brainstorming & Analyse
Marketing & Indhold
Uddannelse og noter
Underholdning
Fritid
Teknologi
Design
Opsummeringer
Andre
Sprog
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Andet
Vis hele kortet
Kopier og rediger map
Kopier
Computer Security,Ethics and Privacy
Andre
JN
Job Nv
Følg
Kom i gang.
Det er Gratis
Tilmeld dig via Google
eller
tilmeld
med din email adresse
Lignende mindmaps
Mindmap-oversigt
Computer Security,Ethics and Privacy
af
Job Nv
1. Computer Security Risks
1.1. The term hacker
1.2. A cracker
1.3. A script kiddie
2. Internet and Network Attacks
2.1. Computer Viruses,Worm and Trojan Horses
2.2. Botnet
2.3. Denial of Service Attacks
2.4. Back Doors
2.5. Safegruards against Botnets,Dos Attacks,Brack Doors and Spoofing
2.6. Firewalls
2.7. Intrusion Detection Software
2.8. Spoofing
2.9. Honeypots
3. Unauthorized Access And Use
3.1. Safeguards against Unauthorized Access and Use
3.2. Identifying and Authenticating Users
4. Hardware Theft And Vandalism
4.1. Safeguards against Hardware Theft and Vandalism
5. Information Theft
5.1. Safeguards against Information Theft Encryption
6. Software Theft
6.1. Safegurads against Software Theft
7. System Failure
7.1. Safeguards against System Failure
8. Backing Up-THe Ultimate Safeguard
9. Wireless Security
10. Ethics And Society
10.1. Information Accuracy
10.2. Intellectual Property Rights
10.3. Codes of Conduct
11. Information Privacy
11.1. Electronic Profiles
11.2. Cookies
11.3. Spyware and Adware
11.4. Spam
11.5. Phishing
11.6. Privacy Laws
11.7. Social Engineering
11.8. Employee Monitoring
11.9. Content Filtering
11.10. Computer Forensics
12. Health Concerns Of Computer Use
12.1. Computer and Health Risks
12.2. Ergonomics and Workplace Design
12.3. Computer Addiction
12.4. Green Computing
13. Chapter Summary
14. High-Tech Talk
14.1. The Key(s) to making Encryption Work
15. Companies On The Cutting Edge
15.1. McAfee
15.2. Symantec
16. Technology Trailblazers
16.1. Donn Parker
16.2. Clifford Stoll
Kom i gang. Det er gratis!
Forbind med Google
eller
Tilmeld