The document discusses network security threats at Cisco Systems. It identifies insiders and outsiders as security threats and notes that insiders have access to all information while outsiders must break in. It explains that risks to Cisco Systems are calculated as vulnerabilities multiplied by threats, and that solutions should focus on proactively eliminating vulnerabilities by predicting what may happen.