Unlock the full potential of your projects.
Try MeisterTask for free.
¿No tienes una cuenta?
Regístrate Gratis
Navegar
Mapas Destacados
Categorías
Gestión de proyectos
Objetivos de negocio
Recursos humanos
Lluvia de ideas y análisis
Marketing y contenido
Educación y notas
Entretenimento
Vida
Tecnología
Diseño
Resúmenes
Otros
Idiomas
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Otros
Ver mapa completo
Copiar y editar mapa
Copiar
Computer Security and Safety,Ethics,and Privacy
Otros
OA
Otomo Aot
Seguir
Comienza Ya.
Es Gratis
Regístrate con Google
ó
regístrate
con tu dirección de correo electrónico
Mapas Mentales Similares
Esbozo del Mapa Mental
Computer Security and Safety,Ethics,and Privacy
por
Otomo Aot
1. Internet and Network Attacks
1.1. Operating system runs much slower than usual
1.2. Available memory is less than expected
1.3. Files become corrupted
1.4. Screen displays unusual message or image
1.5. Music or unusual sound plays randomly
1.6. Existing programs and files disappear
1.7. Programs or files do not work properly
1.8. Unknown programs or files mysteriously appear
1.9. System properties change
1.10. Operating system does not start up
1.11. Operating system shuts down unexpectedly
2. Unauthorized Access and Use
2.1. Unauthorized access is the use of a computer or network without permission
2.2. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities
3. Information Theft
3.1. Digital Certificates
3.2. Transport Layer Security (TLS)
3.3. Secure HTTP
3.4. VPN
4. Health Concerns of Computer Use
4.1. Craves computer time
4.2. Overjoy when at the computer
4.3. Unable to stop computer activity
4.4. Irritable when not at the computer
4.5. Neglects family and friends
4.6. Problems at work or school
5. Ethics and Society
5.1. Allow for personalization
5.2. Store users’ passwords
5.3. Assist with online shopping
5.4. Track how often users visit a site
5.5. Target advertisements
6. Objectives Overview
6.1. Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators
6.2. Describe various types of Internet and network attacks, and identify ways to safeguard against these attacks
6.3. Discuss techniques to prevent unauthorized computer access and use
6.4. Identify safeguards against hardware theft and vandalism
6.5. Explain the ways software manufacturers protect against software piracy
6.6. Discuss how encryption works, and explain why it is necessary
7. Computer Security Risks
7.1. Hackers
7.2. Crackers
7.3. Script Kiddies
7.4. Corporate Spies
7.5. Unethical Employees
7.6. Cyberextortionists
7.7. Cyberterrorists
8. Hardware Theft and Vandalism
8.1. Physical access controls
8.2. Alarm systems
8.3. Cables to lock equipment
8.4. Real time location system
8.5. Passwords, possessed objects, and biometrics
9. Wireless Security
9.1. A wireless access point should not broadcast an SSID
9.2. Change the default SSID
9.3. Configure a WAP so that only certain devices can access it
9.4. Use WPA or WPA2 security standards
10. Summary
10.1. Potential computer risks and the safeguards
10.2. Wireless security risks and safeguards
10.3. Computer-related health issues and preventions
10.4. Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, green computing, and information privacy
Comienza Ya. ¡Es Gratis!
Conéctate con Google
ó
Regístrate