This document discusses various computer security risks and safeguards. It describes types of network attacks like viruses, worms, and Trojan horses. It also discusses unauthorized access and ways to prevent it through access controls, passwords, biometrics, and digital forensics. The document covers risks of hardware theft, software theft, and information theft. It discusses safeguards like encryption, digital signatures, and backups. Other topics include wireless security risks, health issues from computer use, and ethical issues around information accuracy, intellectual property, green computing, and privacy.