This document summarizes a presentation on computer security, social engineering, and physical security in a scientific research environment. The presentation covers topics like identification vs authentication, social engineering techniques like pretexting and phishing, dangers of QR codes and social media, passwords, malware, identity theft, and physical security. It emphasizes that computer security has both a technical and human component, and that social engineering tricks people into sharing information or performing actions through deception.