Types of computer crimes that have been committed by outside intruders or by employees over the past three to five years.
Create a list of these crimes, include a description of each crime and its impact on the business victims. Describe how an e-business might protect itself against such risks.