This document discusses information security and privacy. It begins by defining computer viruses and how they work, reproducing and attaching to other programs. It then discusses popular types of viruses like file infectors, boot sector viruses, Trojan horses, and worms. The document outlines how viruses can damage systems and be spread, as well as common symptoms. It recommends prevention methods like antivirus software and firewalls. The document concludes by covering data security issues in the US, categories of security breaches, and the Privacy Act of 1974.