This document presents information on computer security and ethics. It discusses various cyber crimes such as hacking, cracking, and cyberterrorism. It also covers malware like computer viruses, worms, Trojan horses, and rootkits. The document outlines symptoms of infection and safeguards against viruses. Additional cyber threats explained include denial of service attacks, back doors, and spoofing. The presentation concludes with information on firewalls and references used.