This document provides an overview of information systems security. It discusses key concepts like confidentiality, integrity, and availability. It also describes the seven domains of a typical IT infrastructure and examples of recent data breaches. The document explains that information systems security involves protecting hardware, software, and data from various risks, threats, and vulnerabilities. The goals of information security are to maintain confidentiality, integrity, and availability of information and information systems.