contestada

Based on Chapter 8 conduct a security audit of your personal use of computer systems and computer technology.
1. Identify points of vulnerability and weakness. (At least six and no more than 10).
2. Describe what you will do to address these.