This document provides an overview of computer security and privacy. It begins with defining key terms like security, privacy, threats, and vulnerabilities. It then discusses the evolution of computer security, highlighting important early cases from the 1970s-1990s. The document outlines different types of computer security like security by design, secure operating systems, and secure coding. It also covers privacy issues and some salient computer security cases from Ethiopia and globally to demonstrate the history and importance of the topic.