This document discusses information security. It defines information security as protecting information systems, hardware, and data. The primary goals of information security are confidentiality, integrity, and availability, known as the CIA triad. Various threats to information security are discussed such as viruses, insider abuse, laptop theft, denial of service attacks, unauthorized access, system penetration, wireless network abuse, telecom fraud, proprietary information theft, financial fraud, misuse of public web applications, and website defacement. The document stresses that companies should implement both preventative and detective controls to mitigate security risks and disruptions.