This document provides an introduction to key concepts in information security including confidentiality, integrity, availability, authentication, authorization, and nonrepudiation. It defines important security terms and describes different types of security attacks such as passive attacks, which observe information without modifying it, and active attacks, which can alter systems and resources. Specific active attack types like masquerade, modification of messages, replay, and denial of service are outlined. The document also discusses the differences between passive and active attacks, and provides examples of how concepts like encryption, authorization, and auditing can help prevent different types of security risks.