This document provides an overview of malicious software, intrusion detection, and firewalls. It defines malware, trojan horses, viruses, and worms. It describes how each functions and spreads. Countermeasures like antivirus software and firewalls are discussed. Intrusion detection approaches like statistical anomaly detection and rule-based detection are also summarized. Common intrusion detection systems and firewall types are briefly mentioned.