Research Assignment

Risks to Privacy from Collecting and Storing Data on a Computer

Misuse of Computing Resources and How They Can Be Protected

Unauthorized Access to Computing Resources