Information security; types of computer threats and protections; computer identified; laws of infringement; computer viruses; policies and practices for system security; management and service of system security; creating a behaviors for computer security at work