The document provides an overview of information systems security. It discusses what information systems security entails, including prevention of system-level attacks, network-level attacks, physical attacks, and attacks using modified hardware. It also describes what system security and network security aim to protect. Examples of famous hackers are given to illustrate different types of attacks. Finally, some basic hacking terminology is defined.
Related topics: