1. Identify existing cybersecurity concerns and potential options to address these issues with the Internet and the systems built on it.
2. Describe how issues related to cybersecurity are directly affected by the connections made between people and computing. Provide three examples specific to this connection.