(Optional) Investigate security issues related to Internet technology.

Investigation should include research to identify threats to computer systems (e.g., spam, malicious software, theft) and the methods for guarding against such threats, including

  • firewalls
  • a regular backup schedule
  • password protection
  • data encryption.