In five pages this paper discusses information system security in a consideration of worms and viruses such as the Trojan. Four sources are cited in the bibliography.