This report provides a detailed analysis of computer security, focusing on the vulnerabilities of a utility company's website to botnet attacks. It explores five key elements of computer security: confidentiality, integrity, availability, accountability, and non-repudiation, along with the differences between classical and modern ciphers. The report illustrates understanding of computer security issues using threat intelligence, and discusses preventive measures such as antivirus, antispyware, and firewalls. It examines various tools for identifying vulnerabilities, spotting potential threats, and detecting compromised systems, including SIEMs and cloud access security brokers. Furthermore, the report appraises cybersecurity frameworks like SABSA, NIST, COBIT and ISO, along with the code of conduct required by IT professionals, covering ethical, social, and legal considerations. The report recommends measures to prevent and mitigate security breaches, emphasizing the importance of continuous updates and proactive security measures.