MAPPING YOUR MIND PROTECTING COMPUTERS IT THREATS malware adware spam bugs RISK PROTECTION malicious programs virus worm backdoor rogue security cryptography public or asymmetrical key private or symmetrical key crimeware dialer browser hijacker ransomware keylogger phishing rootkit spyware Trojan horse social engineering identity theft firewall hardware firewall software firewall antivirus software stand-alone malware protection security suite mobile malware spyware Trojan horse worm expander ghost push bluejacking bluesnarfing bluebugging users precautions for security up-dates passwords backups unknown emails network threats DOS packet sniffing port stealing spoofing unauthorised access destructive attack users best practices for using the PC how to start and stop the computer how to store and keep data how to keep the computer working network security identification (username) authentication (password) authorisation