The document discusses security concepts in information systems including prevention of unauthorized access, modification, and deletion of information. It outlines unintentional threats like human error and intentional threats like criminal attacks. The goals of information security are prevention, detection, and response. Risks to applications and data include computer crime, hacking, cyber-theft, unauthorized work use, software piracy, and viruses/worms. Risks to hardware include natural disasters, blackouts, and vandalism. Major defense strategies are encryption, authentication, firewalls, email monitoring, antivirus software, backup files, security monitors, and biometric controls. The document also discusses disaster recovery, business recovery plans, and general controls to minimize errors and disasters.