1. Objectives List measures to protect data from unauthorised access List precautions against virus attacks State examples of computer crimes List measures to prevent computer…