Improper use of computing equipment
Improper use of computing equipment
- programs to control the use of computing equipment
- use and abuse of the computers at work
Protection of the computer equipment
- defensive methods against intruders
- investigations related to email accounts