This covers anything that can have negative consequences for the user of the computer if not used correctly (allowing another user to gain remote control of the affected computer, obtain confidential data, create Trojans or viruses, etc.).