This document discusses various threats to computer security and methods for protecting computers and networks. It covers how malicious individuals can steal information or use systems to send spam. It then analyzes security threats from mistakes and malicious actors. It provides recommendations for establishing local control through access policies, backups, and tracking usage. Additional topics covered include social engineering, infiltration, authentication, encryption, firewalls, viruses, spam, wireless security, and incident reporting.