This document discusses key concepts in information systems security including confidentiality, integrity, availability (CIA), common threats across seven domains of an IT infrastructure, and roles involved in implementing the CIA triad. It explains the CIA concepts, outlines common threats in different domains like users, workstations, LANs, and remote access, and identifies users, administrators, managers and vendors as responsible for maintaining confidentiality, integrity and availability.