Identify security issues related to computer hardware, software, and data.
Identification should include a list of methods for preventing and consequences of dealing with the
- theft of equipment or intellectual property
- loss or corruption of data through malicious software
- unauthorized entry into the computer system and/or applications
- accidental loss or corruption of data by a user or company
- loss or theft of private company or customer information.