2 DIfferent computer security Risks