week 13

Introduction to Networks, wireless networks, cloud computing.

COMPUTER SECURITY RISKS
INTERNET AND NETWORK
ATTACKS
Computer Viruses, Worms, and Trojan
Horses
Safeguards against Computer Viruses,
Worms, and Trojan Horses
Botnets
Denial of Service Attacks
Back Doors
Spoofing
Safeguards against Botnets, DoS Attacks,
Back Doors, and Spoofing
Firewalls
Intrusion Detection Software
UNAUTHORIZED ACCESS AND USE
Safeguards against Unauthorized Access
and Use
Identifying and Authenticating Users
HARDWARE THEFT
AND VANDALISM
Safeguards against Hardware Theft
and Vandalism
SOFTWARE THEFT
Safeguards against Software Theft
INFORMATION THEFT
Safeguards against Information Theft
Encryption
SYSTEM FAILURE
Safeguards against System Failure
BACKING UP — THE ULTIMATE
SAFEGUARD
WIRELESS SECURITY
ETHICS AND SOCIETY
Information Accuracy
Intellectual Property Rights
INFORMATION PRIVACY
Electronic Profiles
Cookies
Spyware and Adware
Phishing
Spam
Privacy Laws
Social Engineering
Employee Monitoring
Content Filtering
Computer Forensics
HEALTH CONCERNS OF COMPUTER
USE
Computers and Health Risks
Ergonomics and Workplace Design
Computer Addiction
Green Computing
CHAPTER SUMMARY
COMPANIES ON THE CUTTING
EDGE
McAfee
Symantec
TECHNOLOGY TRAILBLAZERS
Donn Parker
Clifford Stoll