null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
10325731
Safety and Security
Description
Safety and Security
No tags specified
ict
Mind Map by
sofia garrido
, updated more than 1 year ago
More
Less
Created by
sofia garrido
over 6 years ago
12
0
0
Resource summary
Safety and Security
Hacking
Gaining illegal access to a computer system.
Effects of Risks
Identity theft or personal information gain
Deletion, changing or corruption of data.
How to avoid it?
Use Firewalls.
Use strong passwords and usernames.
Use anti-hacking software.
Also change them frequently.
Which is a piece of software placed between your computer and your network (LAN/WAN).
Viruses
A program which can replicate itself with the intent of deleting or corrupting files, or causing a computer to malfunction.
Effects of Risks
Delete or corrupt files.
Can cause your computer to malfunction, crash or be unresponsive
How to avoid it?
Use anti-virus software.
Do not use softwares from unknown sources.
Be cautious when opening emails or files from unknown senders.
Spyware
A software which gathers key presses on your keyboard which are the sent to the originator.
Effects of Risk
The originator has acces to anything typed on your keyboard.
The software is able to install other spyware, read cookies and change your default web browser.
How to avoid it?
Use anti-spyware software.
Use an on-screen keyboard when typing private or important information.
Be alert and look for clues to see if your keyboard is being monitored.
Wardriving
Locating and using Wi-Fi illegally.
A device (laptop, phone), a wireless network card and an antenna are used to pick up signals.
Effects of Risk
It is possible to hack into the Wi-Fi and steal private information.
You internet time or allocation is used up if the culprit downloads large files.
How to avoid it?
Use WEP encryption.
Use Firewalls to prevent outsiders from getting access.
Media attachments
Spyware (image/png)
Riesgos Del Internet (image/jpeg)
Ximg 56a6c8325a885.Png.Pagespeed.Gp+Jp+Jw+Pj+Ws+Js+Rj+Rp+Rw+Ri+Cp+Md.Ic.Bv Bo8d Vaq (image/png)
09inf051 (image/jpeg)
151228 Online Fraud Hacking 415p 1f4a69829f4841f440828b3b86d4a071.Nbcnews Ux 2880 1000 (image/jpeg)
Computervirus (image/jpeg)
Antivirus Shield (image/jpeg)
Computer Crash (image/jpeg)
Firewall (image/jpeg)
4d9fc247a891d (image/jpeg)
Strong Password (image/jpeg)
Private Information Of 6 Million Users Stolen From Cash Crate (image/jpeg)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
Unit 3. Tools for Communities of Practice (CoP)
Roberto Rojas
Web 2.0
Jennifer Méndez
PARTS OF THE COMPUTER
Itziar Gonzalez Moral
Entornos, Modalidades y Didácticas Con Tecnología
Yuliana Trujillo
PARTS OF THE COMPUTER
Laia Almeda Gonzalez
ICT
Javier Indurain
Teaching Technological Methologies
mimigo92
Internet
Nayelli Morales
ITC
alejandroaleman95429
yusef cuestions
Yusef Z
Mazu
Mazu Mohamed mazouz
Browse Library