. . . "In an interconnected computing environment, access to a resource such as a server or other computer or active device may give rise to vulnerabilities such as exposure to one or more viruses." . .