The computing security problem. Threats, vulnerabilities, exploits, defenses and countermeasures. Firewalls and TCP/IP services. Information and risk. Implementing security policies and practices. Disaster planning, prevention, and recovery operations. Legal, ethical and privacy issues.