The document discusses internet security threats such as viruses, worms, Trojan horses, spam, and phishing. It provides definitions and examples of each threat. It also offers best practices for protecting computers such as installing antivirus software, using firewalls, creating strong passwords, and backing up files regularly. The document concludes by emphasizing the importance of keeping computers updated and not sharing personal information online.