Introduction to Security Chuan-kai Yang. Outline Trojan horse, virus and worm Attacks & preventions Cryptography Steganography.