In this chapter we have given an introduction to selected computer security techniques and concepts. Security for distributed systems is still an open area for research and development. Perhaps the lower-level methods, different cryptographic methods and so forth, can be considered relatively well understood. However, on the intermediate and high system levels we see still the need for much further work, for instance in creating functioning key distribution infrastructures and other trusted third party services.