The document discusses cyber security and computer security. It defines key terms like computer security, network security, and internet security. It describes security attacks like passive attacks involving eavesdropping and active attacks involving modifying data. It also discusses security services like confidentiality, authentication, and integrity, and security mechanisms like encryption and digital signatures that are used to provide these security services and counter security attacks. Finally, it presents models for network security and network access security.