This 4 page paper discusses computer security in four areas: auditing and monitoring; cryptosecurity; transmission security; and TEMPEST. Bibliography lists 7 sources.