Identify security issues related to computer hardware, software, and data.

Identification should include a list of methods for preventing and consequences of dealing with the

  • theft of equipment or intellectual property
  • loss or corruption of data through malicious software
  • unauthorized entry into the computer system and/or applications
  • accidental loss or corruption of data by a user or company
  • loss or theft of private company or customer information.