This document discusses security investigations and the need for information security in organizations. It outlines four main functions of information security: 1) protecting organizational functionality, 2) enabling safe application operations, 3) protecting collected data, and 4) safeguarding technology assets. It then discusses threats to information security such as human error, espionage, software attacks, and natural disasters. Specific threats include viruses, worms, Trojan horses, backdoors, and denial of service attacks. The document also covers categories of attacks like malicious code, IP scanning, and social engineering.