This document defines cyber crime and discusses various types, including hacking, identity theft, virus dissemination, cyber stalking, and software piracy. It provides definitions for hacking, malware, cyber stalking, logic bombs, and denial-of-service attacks. The document also offers safety tips for internet users and discusses advantages and disadvantages of information security.