Kinds of computer crimes which have been committed by outside intruders or by employees over past three to five years.
Develop the list of these crimes, include description of each crime and its influence on business victims. Explain how the e-business might protect itself against such risks.