Chapter 5. SAFE COMPUTER
 
5.1 Examples of attacks: ransomware
 
5.2 Examples of attacks: macro viruses and phishing
5.3 05-03 Attackers' goals and methods
5.4 Computer technical security
5.5 Data backup and archiving
 
5.6 Systematic approach to security