The document discusses the evolution of computer security, highlighting notable intrusions and the financial losses companies face due to security incidents. It covers various types of attacks, including network threats and social engineering, and emphasizes the importance of security measures like cryptography and safe computing practices. Additionally, it points out that complete computer security is unattainable, likening it to a perpetual cat-and-mouse game between hackers and law enforcement.