This document discusses various topics related to information security including logical access exposures, network infrastructure security, auditing network security, environmental issues and controls, and encryption. It describes common security threats like viruses, worms, Trojan horses, and denial of service attacks. It also outlines controls and countermeasures for securing logical access such as access control software, passwords, biometrics, and firewalls. Network security topics covered include LAN security, client-server security, and intrusion detection systems.