This document discusses electronic security in computer networks. It covers securing network information through confidentiality, availability, and integrity. It describes authentication of users, acceptable use policies, and information integrity. It also discusses threats to security like hackers, viruses, and malicious insiders. Finally, it outlines security tools like firewalls, proxy servers, and intrusion detection systems that can help secure networks.