computer safety and ethics

Description

Mind Map on computer safety and ethics, created by rawda on 06/02/2014.
rawda
Mind Map by rawda, updated more than 1 year ago
rawda
Created by rawda almost 11 years ago
13
1

Resource summary

computer safety and ethics
  1. maintaing a safe computing environment
    1. pay attention to your
      1. posture
        1. activity level
          1. lighting
          2. change your position
            1. review product safety guid lines
              1. pay attention to icon
              2. preventing computer related injuries
                1. to avoid chronic physical maladies
                  1. such as
                    1. eyestarin
                      1. back problem
                        1. repetitive strain injury (RSI)
                        2. well design work area
                          1. use ergonomic furniture
                            1. maintain good posture
                              1. taking regular breaks
                      2. Identifying security risk
                        1. what will happen when other can use your banboard connection
                          1. RESULTS?
                            1. slow down your internet access
                              1. charged for actual usage
                                1. they will use sniffer program
                                  1. what is sniffer? a program that hackers use to capture user name and password on a network
                              2. using network protection
                                1. when setting up your wireless network
                                  1. 1- change your password
                                    1. 2-turn on some of the encryption
                                      1. 3-turn off network during extended period
                                    2. computer hacking
                                      1. proplem
                                        1. hacking ( hakers ) : computer experts who enjoy having the power to invade someone else privacy
                                        2. solution
                                          1. Hardware Firewall : a secured firewall that controls the computers from one point should be implemented
                                        3. avoding data loss
                                          1. who can we avoid data loss
                                            1. 1- save frequentaly
                                              1. 2- secure electric cords
                                                1. 3- install an uninterruptible power supply
                                                  1. 4- plug surge suppressors into electric outlets
                                                2. safeguarding data agains software
                                                  1. problem
                                                    1. browser hijacking: hackers use it control you browser
                                                      1. spyware: software installed in a computer to collect information
                                                        1. key logger: malicious program that record strokes
                                                          1. virus: program that has been written by a hacker to destroy you computer
                                                            1. brute force attacks : use a script to log to an account using hundreds of words
                                                              1. worm: makes many copies of itself resulting slowing down the device
                                                              2. solution
                                                                1. use antivirus : program that regularly scan your system for harmful files
                                                                  1. antispyware : software that protect your system against spyware
                                                                    1. strong password: complex and secure password that contains letters and numbers
                                                                2. avoiding e-commerce problems
                                                                  1. before providing personal information on credit card information on an e-commerce site
                                                                    1. 1- verify that the site is secure
                                                                      1. 2- that the site provide SSL ( secure socket layer ) and TLS ( transport layer security )
                                                                    2. To make sure your e-commerce transaction are secure and to protect your private information
                                                                      1. 1- use a secure browder
                                                                        1. 2- check privacy policies
                                                                          1. 3- keep personal information private
                                                                        2. cookies and spyware
                                                                          1. what is cookies
                                                                            1. small files created when you vista a website
                                                                            2. what is spyware
                                                                              1. tracks your web habits
                                                                            3. securing data
                                                                              1. put a password
                                                                                1. use a code names instead of real name
                                                                                  1. use an ilas in blogs and social website
                                                                                    1. log of from a computer after using it
                                                                                    Show full summary Hide full summary

                                                                                    Similar

                                                                                    Chemistry General Quiz
                                                                                    lauren_johncock
                                                                                    Chemistry General Quiz - 2
                                                                                    lauren_johncock
                                                                                    Present Simple vs. Present Continuous
                                                                                    Marek Mazur
                                                                                    C1 B1 & P1 Test
                                                                                    jodie00
                                                                                    Biology AS Level UNIT 1
                                                                                    Valentin Andrei
                                                                                    HRCI Glossary of Terms O-Z
                                                                                    Sandra Reed
                                                                                    Chemistry GCSE
                                                                                    frimpongr
                                                                                    Natural Law
                                                                                    Rachel Wallace
                                                                                    English Basic Grammar
                                                                                    tvazacconcia
                                                                                    Métodos y reglas de interpretación jurídica Constitucional y Ordinaria
                                                                                    jose calle
                                                                                    PROFESSIONAL DEVELOPER TEST POOL-1 (MAGENTO 2 CERTIFIED )
                                                                                    Miska Red