Please enable JavaScript.
Coggle requires JavaScript to display documents.
Domain IV, toxins, . - Coggle Diagram
Domain IV
C1
SSL Protocol
Data Integrity
Database management
Security
Data backup
Data validation
Authentification
Methods
Username & password
Biometrics
Two-Factor
Challenges
Automation
Data Protection
User Experience
Basics
Types
Security
Definition
TLS
Implementation
Overview
Applications
HTTPS
Security benefits
Integrity
Authentification
Security
Encrypted data
Deployment strategies
Overview
Encryption
Security
Tools and software
AxCrypt
Bitlocker
TrueCrypt
PGP
GPG
Algorithms
Types
Asymmetric key
Hashing
Symmetric key
Digital signatures
Password security
Creation
Storage
Strength
Management
Protection
Phishing & ransomware
Signs
Consequences
How to protect?
Prevention and response strategies
Types
Antivirus: Basic functions
Detection
Scanning
Real-Time Protection
Heuristics
Prevention
Firewalls
Application Control
E-mail Scanning
Overview
Definition
Common features
Remediation
Quarantine
Repair/Removal
System Restore
C3
Digital well being
Tech wellness
Social life
Connect with others around us
Communication
Work
Productivity
Tools to create tech wellness
Digital guidlines
Tools only to your homescreen
Do not disturb mode
Notification
Physical guidelines
Switch off mobile
In Control of technology
Tech usage
Self aware
Vision
Time spent
Enviromental impact of DT
Pollution
water
Mine
Refined oil
Digital centers
carbon emmisions
electricity
E waste
loss of biodiversity
lithium batteries
Indium
rare metal
Digital expansion
What we supposed to do
manufacture
sustainable
clean
smaller ecological footprint
Building awarness
investments
enviromentally friendly alternatives
lifespan of products
increased
C2
protect personal data and privacy
the right of individuals to their personal data
Right of rectification
Right of opposition
Right to portability
Right to erase
Right to limitation of processing
Right of access
The 10 basic principles by Martin Vidberg.
Beware of photos and videos
Use a pseudonym
Create multiple email addresses
Secure your accounts
Watch out for passwords
don't say everything
Clean up your history
Respect others
Verify your traces
Think before posting
about Tracers
cryptology
uses
integrety :ensure that a file has not been modified
hash function
encryption
keyed hash function
digital signature
privacy :protecting your files from unwanted reading
.
.
Authencity :be sure of the origin on the file
.
.
.
Cookies
limit
.
Configure the management of cookies and trackers
8 more items...
delete
.
Internet exchanges.:A client, a server, requests
Https
identifiable
by the presence of an "s" after the http
by the presence of a closed padlock at the bottom right of your browser
toxins
.