This document discusses Java Card security. It begins with an overview of Java Card and its benefits, including being interoperable, secure, supporting multiple applications, and being dynamically updatable. It then covers Java Card applet lifecycles, concepts like verification, loading, firewalls and atomicity, compares Java Card to Java, analyzes risks like denial of service and privacy invasion, demonstrates attacks like using Trojan code and firewall type confusion, and concludes that while threats exist, security measures can counteract them and Java Card security is attainable.