•Personal computing was easier
•File protection vs sharing
•Passwords & Access Control
•
•Networking adds complexity
•Firewalls & Virtual Private Networks
•Cookies: good or bad?
•Trusted sources & Digital signatures
•Certificates & Authentication
•Viruses & Worms
•