Two choices of topic
1.Assess “the web,” how it works, its key components, and applications. Examine future trends related to the web.
2.Examine why information systems are vulnerable to destruction error and abuse.
Analyze the various types of threats including malicious software, hackers and computer crime, internal threats, and software vulnerability.