In seven pages this paper considers Internet security issues in a consideration of such topics as hacker insurance and encryption technology. Nine sources are cited in the bibliography.