Ownership
Who has the right to use a computer?
Who establishes this policy? How?
- What equity considerations are raised?
Can someone else deny access?
- Denial of service attacks
How can denial of service be prevented?
- Who can gain access and what can they do?