This document discusses computer system security and threats. It begins by comparing physical security of valuables to computer security, noting the goals of authorizing access. It then discusses securing computer hardware, data, and threats like denial of service, interception, and modification attacks. The document covers authentication methods like passwords, biometrics, and challenge-response. It also discusses software threats like Trojan horses, login spoofing, logic bombs, backdoors, buffer overflows, and viruses. It explains how viruses work and spread, and antivirus techniques like scanning. The overall document provides an overview of computer security concepts and threats.