The document discusses cyber crimes and how to protect from them. It defines cyber crimes as any crime involving computers and networks, dividing them into those using computers as targets and weapons. It then lists and briefly explains common types of cyber crimes like hacking, denial of service attacks, virus dissemination, computer vandalism, cyber terrorism, and software piracy. The document notes that governments and certain groups are often targets of hackers and viruses can damage data. It provides an example of cyber terrorism and urges using open source software or paying for licensed copies to avoid software piracy. Finally, it states that the next speaker will discuss how to protect from cyber crimes.