This document discusses computer security and risks. It describes several types of computer crimes like software piracy, hacking, and computer sabotage using viruses, trojans, and worms. It explains how these crimes affect personal privacy and outlines some security measures to protect hardware, data, and replicate data through backups and RAID systems to reduce risks. Physical access restrictions and passwords, firewalls, encryption, and audit control software can help protect sensitive information on computers and networks.