This document discusses cyber security strategies for companies in the digital world. It explains that without a cyber security plan, no company will survive the increasing virus attacks online. It then provides details on common types of malware like viruses, worms, spyware, and ransomware. It describes how viruses can infect systems through various transmission methods such as boot sector infections, file infections, macro infections, and more. The document outlines characteristics of virus payloads and how they are designed to cause damage when executed. It also explains the typical components that make up viruses, such as search routines, infection routines, and trigger routines.