This document provides an introduction to cybercrime and computer security. It defines cybercrime as using the internet to commit crimes like identity theft, hacking, spreading viruses, and facilitating traditional crimes. Cybercrimes can be committed using computers, cell phones, and other devices. Examples of high-profile cybercrime cases include the TJ Maxx data breach and evidence obtained from the BTK serial killer's cell phone. The document outlines key aspects of computer security like confidentiality, integrity and availability. It also discusses common security threats such as malware, intrusions, denial-of-service attacks, and careers and certifications in information security.