This document summarizes key aspects of cyber security. It begins with an introduction defining cyber security and information security. It then discusses hacking, noting that while some hackers solve technical problems, others seek unauthorized access for personal gain or just because they can. The document outlines how cyber threats have evolved as more businesses use cloud infrastructure, and how security controls have also become more sophisticated in response. Finally, it discusses the advantages of cyber security for organizations and individuals, and provides some safety tips to help prevent cyber crime.