• Explain the threats to your computers and data • Describe how to control the local computing environment • Explain how to protect computers from network threats
2.
What first name or nickname would you like us to use?
You may optionally provide this to label your report, leaderboard, or certificate.