computer safety and ethics

Beschreibung

Mindmap am computer safety and ethics, erstellt von rawda am 02/06/2014.
rawda
Mindmap von rawda, aktualisiert more than 1 year ago
rawda
Erstellt von rawda vor mehr als 11 Jahre
13
1

Zusammenfassung der Ressource

computer safety and ethics
  1. maintaing a safe computing environment
    1. pay attention to your
      1. posture
        1. activity level
          1. lighting
          2. change your position
            1. review product safety guid lines
              1. pay attention to icon
              2. preventing computer related injuries
                1. to avoid chronic physical maladies
                  1. such as
                    1. eyestarin
                      1. back problem
                        1. repetitive strain injury (RSI)
                        2. well design work area
                          1. use ergonomic furniture
                            1. maintain good posture
                              1. taking regular breaks
                      2. Identifying security risk
                        1. what will happen when other can use your banboard connection
                          1. RESULTS?
                            1. slow down your internet access
                              1. charged for actual usage
                                1. they will use sniffer program
                                  1. what is sniffer? a program that hackers use to capture user name and password on a network
                              2. using network protection
                                1. when setting up your wireless network
                                  1. 1- change your password
                                    1. 2-turn on some of the encryption
                                      1. 3-turn off network during extended period
                                    2. computer hacking
                                      1. proplem
                                        1. hacking ( hakers ) : computer experts who enjoy having the power to invade someone else privacy
                                        2. solution
                                          1. Hardware Firewall : a secured firewall that controls the computers from one point should be implemented
                                        3. avoding data loss
                                          1. who can we avoid data loss
                                            1. 1- save frequentaly
                                              1. 2- secure electric cords
                                                1. 3- install an uninterruptible power supply
                                                  1. 4- plug surge suppressors into electric outlets
                                                2. safeguarding data agains software
                                                  1. problem
                                                    1. browser hijacking: hackers use it control you browser
                                                      1. spyware: software installed in a computer to collect information
                                                        1. key logger: malicious program that record strokes
                                                          1. virus: program that has been written by a hacker to destroy you computer
                                                            1. brute force attacks : use a script to log to an account using hundreds of words
                                                              1. worm: makes many copies of itself resulting slowing down the device
                                                              2. solution
                                                                1. use antivirus : program that regularly scan your system for harmful files
                                                                  1. antispyware : software that protect your system against spyware
                                                                    1. strong password: complex and secure password that contains letters and numbers
                                                                2. avoiding e-commerce problems
                                                                  1. before providing personal information on credit card information on an e-commerce site
                                                                    1. 1- verify that the site is secure
                                                                      1. 2- that the site provide SSL ( secure socket layer ) and TLS ( transport layer security )
                                                                    2. To make sure your e-commerce transaction are secure and to protect your private information
                                                                      1. 1- use a secure browder
                                                                        1. 2- check privacy policies
                                                                          1. 3- keep personal information private
                                                                        2. cookies and spyware
                                                                          1. what is cookies
                                                                            1. small files created when you vista a website
                                                                            2. what is spyware
                                                                              1. tracks your web habits
                                                                            3. securing data
                                                                              1. put a password
                                                                                1. use a code names instead of real name
                                                                                  1. use an ilas in blogs and social website
                                                                                    1. log of from a computer after using it
                                                                                    Zusammenfassung anzeigen Zusammenfassung ausblenden

                                                                                    ähnlicher Inhalt