Computer Systems Security ABSTRACT 3 INTRODUCTION 4 LITERATURE REVIEW5 TASK 6 Impact on the Normal Man 8 Questioners 9 Importance of Risk analysis in the primary data-12 Identifying the different applicationsupporttocryptographyand encryption with primary data- 14 Propose An App for Normal Man /Screenshot of Applications 15 Create Risk chart with probability and mitigation plan with the help of primary data 18 Legal, Social and Ethical issues: 23 CONCLUSION 23 REFERENCES 24 ABSTRACT Computer system security is