The document discusses various security threats in e-commerce. It begins by defining a threat as any person, object, or entity that poses a constant danger to an asset. It then categorizes different types of threats including acts of human error, espionage/trespassing, and network security goals of confidentiality, integrity, authentication, and availability. The document also discusses encryption techniques like symmetric, asymmetric, and digital signatures. It provides examples of symmetric algorithms such as DES, AES, and RSA for asymmetric encryption. Finally, it summarizes various cryptography-based protocols and applications used for e-commerce security.