Unlock the full potential of your projects.
Try MeisterTask for free.
Vous n'avez pas de compte ?
Inscription gratuite
Parcourir
Cartes en vedette
Catégories
Gestion de projet
Objectifs d'affaires
Ressources humaines
Brainstorming et analyse
Marketing et contenu
Éducation et remarques
Loisirs
Vie courante
Technologie
Design
Résumés
Autre
Langues
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Autre
Montrer carte totale
Copier éditer carte
Copier
Computer Security,Ethics and Privacy
Autre
JN
Job Nv
Suivre
Lancez-Vous.
C'est gratuit
S'inscrire avec Google
ou
s'inscrire
avec votre adresse e-mail
Cartes mentales similaires
Plan de carte mentale
Computer Security,Ethics and Privacy
par
Job Nv
1. Computer Security Risks
1.1. The term hacker
1.2. A cracker
1.3. A script kiddie
2. Internet and Network Attacks
2.1. Computer Viruses,Worm and Trojan Horses
2.2. Botnet
2.3. Denial of Service Attacks
2.4. Back Doors
2.5. Safegruards against Botnets,Dos Attacks,Brack Doors and Spoofing
2.6. Firewalls
2.7. Intrusion Detection Software
2.8. Spoofing
2.9. Honeypots
3. Unauthorized Access And Use
3.1. Safeguards against Unauthorized Access and Use
3.2. Identifying and Authenticating Users
4. Hardware Theft And Vandalism
4.1. Safeguards against Hardware Theft and Vandalism
5. Information Theft
5.1. Safeguards against Information Theft Encryption
6. Software Theft
6.1. Safegurads against Software Theft
7. System Failure
7.1. Safeguards against System Failure
8. Backing Up-THe Ultimate Safeguard
9. Wireless Security
10. Ethics And Society
10.1. Information Accuracy
10.2. Intellectual Property Rights
10.3. Codes of Conduct
11. Information Privacy
11.1. Electronic Profiles
11.2. Cookies
11.3. Spyware and Adware
11.4. Spam
11.5. Phishing
11.6. Privacy Laws
11.7. Social Engineering
11.8. Employee Monitoring
11.9. Content Filtering
11.10. Computer Forensics
12. Health Concerns Of Computer Use
12.1. Computer and Health Risks
12.2. Ergonomics and Workplace Design
12.3. Computer Addiction
12.4. Green Computing
13. Chapter Summary
14. High-Tech Talk
14.1. The Key(s) to making Encryption Work
15. Companies On The Cutting Edge
15.1. McAfee
15.2. Symantec
16. Technology Trailblazers
16.1. Donn Parker
16.2. Clifford Stoll
Lancez-vous. C'est gratuit!
Connectez-vous avec Google
ou
S'inscrire