Unlock the full potential of your projects.
Try MeisterTask for free.
Heb je nog geen account?
Meld je Gratis aan
Browse
Aanbevolen kaarten
Rubrieken
Project management
Zakelijke doelen
Personeelszaken
Brainstormen en analyseren
Marketing & Inhoud
Onderwijs en notities
Entertainment
Leven
Technologie
Ontwerp
Samenvattingen
Andere
Talen
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Andere
Toon volledige map
Kopieer en bewerk map
Kopieer
Computer Security,Ethics and Privacy
Andere
JN
Job Nv
Volg
Laten we beginnen.
Het is Gratis
Login met Google
of
registreren
met je e-mailadres
Vergelijkbare mind mappen
Overzicht van map
Computer Security,Ethics and Privacy
Door
Job Nv
1. Computer Security Risks
1.1. The term hacker
1.2. A cracker
1.3. A script kiddie
2. Internet and Network Attacks
2.1. Computer Viruses,Worm and Trojan Horses
2.2. Botnet
2.3. Denial of Service Attacks
2.4. Back Doors
2.5. Safegruards against Botnets,Dos Attacks,Brack Doors and Spoofing
2.6. Firewalls
2.7. Intrusion Detection Software
2.8. Spoofing
2.9. Honeypots
3. Unauthorized Access And Use
3.1. Safeguards against Unauthorized Access and Use
3.2. Identifying and Authenticating Users
4. Hardware Theft And Vandalism
4.1. Safeguards against Hardware Theft and Vandalism
5. Information Theft
5.1. Safeguards against Information Theft Encryption
6. Software Theft
6.1. Safegurads against Software Theft
7. System Failure
7.1. Safeguards against System Failure
8. Backing Up-THe Ultimate Safeguard
9. Wireless Security
10. Ethics And Society
10.1. Information Accuracy
10.2. Intellectual Property Rights
10.3. Codes of Conduct
11. Information Privacy
11.1. Electronic Profiles
11.2. Cookies
11.3. Spyware and Adware
11.4. Spam
11.5. Phishing
11.6. Privacy Laws
11.7. Social Engineering
11.8. Employee Monitoring
11.9. Content Filtering
11.10. Computer Forensics
12. Health Concerns Of Computer Use
12.1. Computer and Health Risks
12.2. Ergonomics and Workplace Design
12.3. Computer Addiction
12.4. Green Computing
13. Chapter Summary
14. High-Tech Talk
14.1. The Key(s) to making Encryption Work
15. Companies On The Cutting Edge
15.1. McAfee
15.2. Symantec
16. Technology Trailblazers
16.1. Donn Parker
16.2. Clifford Stoll
Begin. Het is gratis!
Verbind met Google
of
Registreren