This document discusses types of malicious software and network attacks. It describes viruses, worms, Trojan horses, and their goals of destroying, corrupting or shutting down data and systems. It also covers spyware, adware, denial of service attacks, and physical security vulnerabilities. The document emphasizes educating users to help protect against malware through training, antivirus software, firewalls, and intrusion detection systems.