computer

what information can u apply to the protection of a personal computer system  against cyber terrorism or information warfare? write a paper outlining the steps you would take to secure a system against these threats .