This document discusses ethical issues and security challenges related to information technology. It covers topics like computer crime, hacking, privacy, censorship, cyberlaw, and strategies for improving security such as encryption, firewalls, biometrics, and fault tolerant systems. The document provides examples and definitions to explain these concepts over several pages. It also includes two case studies and questions to help readers apply the concepts.