This document summarizes various internet security threats. It discusses how viruses and worms can infect computers and spread via email or file transfers. Viruses attach to programs while worms spread independently. Their payloads can erase disks, install trojans, or redirect users to unwanted sites. Trojans also install unwanted programs like spyware. The document outlines social engineering techniques used to steal information as well as hacking methods like port scanning and exploiting vulnerabilities to break into systems. Denial of service attacks aim to make systems unavailable by overloading them with traffic from bots. Potential attackers range from hackers to disgruntled employees, virus writers, and cyber criminals or terrorists.