This document summarizes security challenges for information systems. It discusses how systems are vulnerable through software and hardware problems, disasters, loss/theft of devices, and internal/external threats. Various types of attacks are mentioned, including malware, hacking, spoofing, and denial of service attacks. The document also covers identity theft, phishing, and specific security controls and technologies used to protect information such as firewalls, intrusion detection, and encryption.