This document discusses cyber security and the need to protect networks, computers, programs, and data from unauthorized access and damage. It addresses risks to computer security like loss of hardware, software, data, or information from breaches. Some breaches are accidental, but some are intentional computer crimes. It also discusses information systems security, access controls, security systems, cyber technology, computer protection methods like antivirus software, and the importance of protecting confidential information stored on computers. Key areas of cyber security addressed include data security, network security, application security, information security, and disaster recovery.