The document discusses various types of cyber attacks including hacking, viruses, denial of service attacks, cyber terrorism, and intellectual property theft. It also covers attacks that can occur within organizations through email abuse, spam, insider breaches of personal databases, and use of work computers for unrelated business. The document stresses the importance of cybersecurity awareness, anti-virus software, firewalls, intrusion detection systems, and encryption to help prevent and mitigate attacks.