If you need to electronically communicate with others, whether it be for business or other purposes, your computer has to be networked. This exposes your computer to various attacks. Typically a user would like to ensure the following when connected to a network: Availability, Integrity, Access...