This document discusses basic security concepts and threats to users, hardware, and data from computers. It outlines threats such as identity theft, loss of privacy from data collection, cookies and spyware that track users, spam, power issues, theft, natural disasters, viruses, Trojan horses, cybercrime like internet fraud, hacking, distributed denial of service attacks, and cyber terrorism. It provides countermeasures for many of these threats, including anti-virus software, firewalls, spam filters, surge protectors, locking computers, backing up data, and government response teams.