Conclusion
This chapter introduced you to a number of different threats, such as viruses, worms, Trojan Horses, and spyware. The chapter also discussed how much it costs when these threats are realized and the system is down. In subsequent chapters, you will learn how to protect a PC or network against these threats.