This document defines and compares viruses, worms, and Trojan horses. It also discusses firewalls, antivirus software, and physical security measures. Without proper security, attackers can intercept login information submitted by users to servers and steal the users' data, as intercepted login pages allow attackers to see submitted login details.