Research Assignment
Risks to Privacy from Collecting and Storing Data on a Computer
Misuse of Computing Resources and How They Can Be Protected
Unauthorized Access to Computing Resources