Describe two (2) potential computer ethics issues associated with holding computers hostage.
Propose two (2) methods that computer users could use to prevent this type of attack.
Propose two (2) governmental legislations that could be enacted against this type of attack.
Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.