This document discusses network management and security. It covers common threats to computer networks like viruses, trojans, worms, logic bombs, and phishing. Viruses replicate by inserting copies of themselves into other programs. Trojans contain malicious code that causes loss of data or system harm. Worms replicate across networks to infect other computers. Logic bombs activate when specified conditions are met. Phishing attempts to steal sensitive information by masquerading as a trusted entity. The document recommends installing quality antivirus software, performing daily scans, disabling autorun features, being wary of email links and attachments, and checking website protocols to help prevent threats.