Ø
The level of risk
Ø
Risky Areas
Ø
Protection of vital information
Ø
Detection and correction of Bugs
Ø
Access Rules for Qualified Information
Ø
Current securities Failures
Ø
Information Stealing
Ø
Hackers
Ø
Solutions Planns
Ø
Vulnerables Nets(Virus Worms)