This document provides an overview of cyber crime and security. It discusses how cyber crime has evolved with technology and can take many forms, from identity theft to illegal hacking. The document then defines cyber crime and outlines some common types, including botnets, Trojan horses, and phishing. It also discusses crimeware tools used by cyber criminals and provides basic tips to prevent cyber crime.