This document outlines several primary threats to information systems including natural disasters, accidents, employees, outside business contacts, and outsiders. It discusses computer crime in terms of definition and estimated worldwide losses in 2006. It also covers federal and state computer crime laws and questions their effectiveness. Additionally, it examines hackers, unauthorized access through misuse of company computers and theft of personal information. Finally, it lists several types of malware that pose threats such as viruses, worms, Trojan horses, logic bombs, spyware, and spam.