This document discusses information security and threats. It begins by defining information security, its primary goals of confidentiality, integrity and availability, and related terms like IT security and information assurance. It then outlines several common threats like unauthorized access, cyber espionage, malware, data leakage, mobile device attacks, spam, and identity theft. Finally, it discusses different types of information security controls including physical, technical and administrative controls to help protect information systems.