Unlock the full potential of your projects.
Try MeisterTask for free.
Não tem uma conta?
Criar conta gratuita
Navegar
Mapas em destaque
Categorias
Gerenciamento de projetos
Negócios e metas
Recursos Humanos
Brainstorming e Análise
Marketing e Conteúdo
Educação e Notas
Entretenimento
Vida
Tecnologia
Design
Resumos
Outro
Idiomas
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Outro
Exibir mapa completo
Copiar e editar mapa
Copiar
Computer Security,Ethics and Privacy
Outro
JN
Job Nv
Seguir
Começar.
É Gratuito
Cadastrar-se com Google
ou
inscrever-se
com seu endereço de e-mail
Mapas mentais semelhantes
Esboço do mapa mental
Computer Security,Ethics and Privacy
por
Job Nv
1. Computer Security Risks
1.1. The term hacker
1.2. A cracker
1.3. A script kiddie
2. Internet and Network Attacks
2.1. Computer Viruses,Worm and Trojan Horses
2.2. Botnet
2.3. Denial of Service Attacks
2.4. Back Doors
2.5. Safegruards against Botnets,Dos Attacks,Brack Doors and Spoofing
2.6. Firewalls
2.7. Intrusion Detection Software
2.8. Spoofing
2.9. Honeypots
3. Unauthorized Access And Use
3.1. Safeguards against Unauthorized Access and Use
3.2. Identifying and Authenticating Users
4. Hardware Theft And Vandalism
4.1. Safeguards against Hardware Theft and Vandalism
5. Information Theft
5.1. Safeguards against Information Theft Encryption
6. Software Theft
6.1. Safegurads against Software Theft
7. System Failure
7.1. Safeguards against System Failure
8. Backing Up-THe Ultimate Safeguard
9. Wireless Security
10. Ethics And Society
10.1. Information Accuracy
10.2. Intellectual Property Rights
10.3. Codes of Conduct
11. Information Privacy
11.1. Electronic Profiles
11.2. Cookies
11.3. Spyware and Adware
11.4. Spam
11.5. Phishing
11.6. Privacy Laws
11.7. Social Engineering
11.8. Employee Monitoring
11.9. Content Filtering
11.10. Computer Forensics
12. Health Concerns Of Computer Use
12.1. Computer and Health Risks
12.2. Ergonomics and Workplace Design
12.3. Computer Addiction
12.4. Green Computing
13. Chapter Summary
14. High-Tech Talk
14.1. The Key(s) to making Encryption Work
15. Companies On The Cutting Edge
15.1. McAfee
15.2. Symantec
16. Technology Trailblazers
16.1. Donn Parker
16.2. Clifford Stoll
Comece Já. É grátis!
Conectar-se com Google
ou
Inscrever-se