The document defines computer threats as any circumstance or event that could adversely impact an information system through unauthorized access, destruction, disclosure, or modification of data. It lists common types of threats such as physical damage, natural events, technical failures, and deliberate attacks. Threats can come from internal sources like employees or external sources like hackers. Common threats are viruses, spyware, hackers, phishing, and spam. The document provides tips for securing a computer system from threats such as using antivirus software, firewalls, backups, strong passwords, and encryption.