Computer Security and Safety,Ethics,and Privasy

Just an initial demo map, so that you don't start with an empty map list ...

Get Started. It's Free
or sign up with your email address
Computer Security and Safety,Ethics,and Privasy by Mind Map: Computer Security and Safety,Ethics,and Privasy

1. INFORMATION PRIVACY

1.1. Electronic Profiles

1.2. Cookies

1.3. Spam

1.4. Phishing

1.5. Spyware and Adware

1.6. Privacy Laws

1.7. Social Engineering

1.8. Employee Monitoring

1.9. Content Filtering

2. HARDWARE THEFT AND VANDALISM

2.1. Safeguards againnst Hardware Theft and Vandalism

3. INFORMATION THEFT

3.1. Safeguards againts Information Theft

3.2. Encryption

4. BACKING UP-THE ULTIMATE SAFEGUARD

5. WIRELESS SECUURITY

6. HEALTH CONCERNS OF COMPUTER USE

6.1. Computers and Health Risks

6.2. Ergonomics and Workplace Design

6.3. Computer Addiction

7. CHAPTER SUMMARY

8. HIGH-TECH TALK

8.1. Encryption Algorithms:The Brains behind Encryption

9. UNAUTHORIZED ACCESS AND USE

9.1. Safeguards against Unauthorized Access and Use

9.2. Identifying and Authenticating Users

9.3. Digital Forensics

10. INTERNET AND NETWORK ATTACKS

10.1. Computer Viruses,Worms,Trojan Horses,and Rootkits

10.2. Safeguards against Computer Viruses and Other Malware

10.3. Botnets

10.4. Denial of Service Attacks

10.5. Back Doors

10.6. Spoofing

10.7. Saftguards against Botnets,Dos/DDos Attacks,Back Doors,and Spoofing

10.8. Firewalls

10.9. Intrusion Detection Software

10.10. Honeypots

11. ETHICS AND SOCIETY

11.1. Information Accuracy

11.2. Intellectual Property Rights

11.3. Codes of conduct

11.4. Green Computing

12. COMPANIES ON THE CUTTING EDGE

12.1. Mcafee

12.2. Symantec

13. TECHNOLOGY TRAILBLAZERS

13.1. Richard Stallman