This document discusses cyber crimes and cyber security. It begins with an introduction to cyber crimes, then discusses the history of cyber crimes dating back to 1820. It outlines various types of cyber crimes such as cyberterrorism, hacking, and identity theft. It also covers cyber security and how it works to defend against cyber attacks through network, application, and information security. The document provides advantages and disadvantages of cyber security, as well as safety tips for preventing cyber crimes like keeping software updated and using strong passwords. It concludes that cyber crimes will continue to evolve so cyber security is needed to help protect users.