Unlock the full potential of your projects.
Try MeisterTask for free.
Heb je nog geen account?
Meld je Gratis aan
Browse
Aanbevolen kaarten
Rubrieken
Project management
Zakelijke doelen
Personeelszaken
Brainstormen en analyseren
Marketing & Inhoud
Onderwijs en notities
Entertainment
Leven
Technologie
Ontwerp
Samenvattingen
Andere
Talen
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Andere
Toon volledige map
Kopieer en bewerk map
Kopieer
Computer Security and Safety,Ethics,and Privasy
Zakelijke doelen
TM
tossaporn malaivichit
Volg
Laten we beginnen.
Het is Gratis
Login met Google
of
registreren
met je e-mailadres
Vergelijkbare mind mappen
Overzicht van map
Computer Security and Safety,Ethics,and Privasy
Door
tossaporn malaivichit
1. New node
2. INTERNET AND NETWORK ATTACKS
2.1. Computer Viruses,Worms,Trojan Horses,and Rootkits
2.2. Safeguards against Computer Viruses and Other Malware
2.3. Botnets
2.4. Denial of Service Attacks
2.5. Back Doors
2.6. Spoofing
2.7. Saftguards against Botnets,Dos/DDos Attacks,Back Doors,and Spoofing
2.8. Firewalls
2.9. Intrusion Detection Software
2.10. Honeypots
3. ETHICS AND SOCIETY
3.1. Information Accuracy
3.2. Intellectual Property Rights
3.3. Codes of conduct
3.4. Green Computing
4. HEALTH CONCERNS OF COMPUTER USE
5. CHAPTER SUMMARY
6. HARDWARE THEFT AND VANDALISM
6.1. Safeguards againnst Hardware Theft and Vandalism
7. INFORMATION THEFT
8. HIGH-TECH TALK
9. INFORMATION PRIVACY
9.1. Electronic Profiles
9.2. Cookies
9.3. Spam
9.4. Phishing
9.5. Spyware and Adware
9.6. Privacy Laws
9.7. Social Engineering
9.8. Employee Monitoring
9.9. Content Filtering
10. TECHNOLOGY TRAILBLAZERS
10.1. Richard Stallman
11. COMPANIES ON THE CUTTING EDGE
11.1. Mcafee
11.2. Symantec
12. WIRELESS SECURITY
13. UNAUTHORIZED ACCESS AND USE
13.1. Safeguards against Unauthorized Access and Use
13.2. New node
13.3. Identifying and Authenticating Users
14. BACKING UP-THE ULTIMATE SAFEGUARD
Begin. Het is gratis!
Verbind met Google
of
Registreren