This document discusses information security, which involves defending information from unauthorized access, use, disclosure, disruption or destruction. It outlines two major aspects of information security - IT security, which involves securing technology and information systems, and information assurance, which ensures data is not lost due to issues like natural disasters. The document also discusses common threats to information systems like unauthorized access, malware and social engineering. It provides security controls to protect systems, including physical controls to restrict access, technical controls using software and hardware, and administrative controls like security policies.