This document summarizes key points from a lecture on commercial and government cyberwarfare. It discusses prospect theory and how it relates to selling information security. It introduces the concept of cyberwarfare and different types of cyber attacks like cyber espionage, web vandalism, gathering sensitive information, and attacking critical infrastructure. The document also covers technical vs administrative information security controls and examples of each.