1438 Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 72 DOI: 10.4018/978-1-5225-5634-3.ch072 ABSTRACT Through commercial networks and across the Internet, there are data fles, millions of images and videos, and trillions of messages fow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person’s identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as efectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given. INTRODUCTION A new theories and terms appear to change the concepts of the economics and the role of the organi- zations in society. Theories such as the “Blue Lake” and terms such as: Network Economics, Virtual Organizations, E-Government, E-Business, and Internet of Things are dependent, in general, on the Internet and Information Technology. New technology always brings new threats and here, security is the main concern for these technologies. The advances of computers and communications have changed our life and habits. Everything now relies on those developed technologies (computer and Internet), communication (email, mobile phones), transportation (airplane navigation, car engine systems), shopping (e-commerce, credit cards, and online stores), medicine (medical records, equipment), entertainment (mp3s, digital cable) and the list goes on. We can see that our daily lives rely on computers. Also, much of our personal information is stored and processed on our own computers or on someone else’s system. The objective of cyber security is to protect and defend that information by detecting, preventing, and responding to cyber-attacks (Ramkumar, 2014). Proposals to Win the Battle Against Cyber Crime Alaa Hussein Al-Hamami Amman Arab University, Jordan