ayesh5797 ayesh5797 06-06-2023 Business contestada Based on Chapter 8 conduct a security audit of your personal use of computer systems and computer technology. 1. Identify points of vulnerability and weakness. (At least six and no more than 10). 2. Describe what you will do to address these.