Plan
IntroductionMain partConclusion(Result)
Computer crimes in the past.
HistoryFirst crimes
Computer crimes now.
Types and how it worksComputer virusesPhishingCyber ExtortionSpam attackidentity theft
Conclusion