The document discusses security threats and attacks against computer systems. It covers program threats like trojan horses, viruses, and buffer overflows. It also discusses system and network threats like port scanning, denial of service attacks, and the Morris Internet worm. The document examines cryptography as a tool to provide security through encryption, digital signatures, public/private key pairs, and hash functions.