Computer and internet security principles, examination of risk identification, network firewalls, proxy applications, screened sub-nets, providing unsecured services, air gap networks, non-Internet protocol connection, external access, World Wide Web security issues, funds transfer issues, other application specific security issues, the role of audit and the internet crime investigation to prosecution process. |