This document discusses network and internet security and types of cyber crimes. It notes that while computers can be used for good or bad, some people use them to carry out illegal activities known as computer crimes. It then describes different types of perpetrators of cyber crimes like hackers, crackers, script kiddies, corporate spies, unethical employees, cyberextortionists, and cyberterrorists. The document also provides details on different types of computer viruses like worms, Trojan horses, macros, and boot sector viruses. It explains concepts like logic bombs, time bombs, data diddling, data stealing, and software piracy.