Computer Security and Safety,Ethics,and Privasy

Get Started. It's Free
or sign up with your email address
Computer Security and Safety,Ethics,and Privasy by Mind Map: Computer Security  and Safety,Ethics,and Privasy

1. New node

2. INTERNET AND NETWORK ATTACKS

2.1. Computer Viruses,Worms,Trojan Horses,and Rootkits

2.2. Safeguards against Computer Viruses and Other Malware

2.3. Botnets

2.4. Denial of Service Attacks

2.5. Back Doors

2.6. Spoofing

2.7. Saftguards against Botnets,Dos/DDos Attacks,Back Doors,and Spoofing

2.8. Firewalls

2.9. Intrusion Detection Software

2.10. Honeypots

3. ETHICS AND SOCIETY

3.1. Information Accuracy

3.2. Intellectual Property Rights

3.3. Codes of conduct

3.4. Green Computing

4. HEALTH CONCERNS OF COMPUTER USE

5. CHAPTER SUMMARY

6. HARDWARE THEFT AND VANDALISM

6.1. Safeguards againnst Hardware Theft and Vandalism

7. INFORMATION THEFT

8. HIGH-TECH TALK

9. INFORMATION PRIVACY

9.1. Electronic Profiles

9.2. Cookies

9.3. Spam

9.4. Phishing

9.5. Spyware and Adware

9.6. Privacy Laws

9.7. Social Engineering

9.8. Employee Monitoring

9.9. Content Filtering

10. TECHNOLOGY TRAILBLAZERS

10.1. Richard Stallman

11. COMPANIES ON THE CUTTING EDGE

11.1. Mcafee

11.2. Symantec

12. WIRELESS SECURITY

13. UNAUTHORIZED ACCESS AND USE

13.1. Safeguards against Unauthorized Access and Use

13.2. New node

13.3. Identifying and Authenticating Users

14. BACKING UP-THE ULTIMATE SAFEGUARD