This document discusses cyber crime management and summarizes key topics covered which include major fraud types, communication media used, database management issues, telecommunication challenges, and legal and regulatory perspectives on cyber crimes. Specific cases of cyber crimes are also presented in a table listing details of number of victims, arrests, fraud amounts, and brief descriptions.