The document discusses key threats, attacks, and controls related to information assurance. It notes that the majority of issues, around 80-90%, occur internally rather than externally. The main controls discussed include sanctioning misuse of privileges, obtaining consent forms for protocol penetration testing, maintaining firewalls and antivirus software, and implementing passwords, smart cards, and biometrics for authentication and non-authorization. The document also questions possible future issues around a potential "cyber 9/11" attack that could bring down a university's systems.