The document discusses various types of cyber attacks including denial of service attacks, spam, salami slicing, viruses, worms, Trojan horses, and different methods viruses use to infect systems like file viruses, boot sector viruses, and timing bump viruses. It also mentions how these attacks can be carried out through email servers and outlines some best practices for prevention, like keeping systems updated with the latest patches and using antivirus software.