2 potential computer ethics issues associated with holding computers hostag
Supplement: 2) Propose 2 methods computer users could use to prevent this type of attack,
3) Propose 2 governmental legislations that could be enacted against this type of attack
4) List at least 2 references
5) APA style.