In four pages this paper examines Internet security issues and system protection measures. Six sources are cited in the bibliography.