1) Describe two (2) potential computer ethics issues associated with holding computers hostage
2) Propose 2 methods computer users could use to prevent this type of attack,
3) Propose 2 governmental legislations that could be enacted against this type of attack
4) List at least 2 references
5) APA style.