Cyber Crime And Its Implications

The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in national capitals. In most countries around the world, however, existing laws are likely to be unenforceable against such crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures to protect themselves from those who would steal or destroy valuable information. Crime is a social and economic phenomenon and is as old as the human society. As, Life is about a mix of good and evil, so is the Internet. For all the good it does to us, cyberspace has its dark sides too The idea of Cyber crime is not new, yet there is significant confusion amongst academics, computer security experts and users as to the extent of real Cyber crimes. In this paper, we explore the breadth of computer-based crime, providing a definition of the emerging terms Cyber crimes. In this paper we will try discuss almost every aspect of cyber crime, like meaning then we divide Cyber crime into three distinct categories: Type I Cyber crimes against persons. Type II Cyber crimes against property. Type III Cyber crimes against government. We are describing its classification and explain the Law of cyber crime. And explain the REASONS of cyber crime and who the cyber criminal is and how to prevent from this crime then we use some case studies to illustrate the role different types of Cyber crime, and offer some observations on the role of cognition in the process of Cyber crime. Finally we provide several suggestions for future work in the area of Cyber Crime.

1. What is Cyber Crime : We read about it in newspapers very often. Let's look at the dictionary definition of Cyber crime: It is a criminal activity committed on the internet. This is a broad term that describes everything from electronic cracking to denial of service attacks that cause electronic commerce sites to lose money.

The internet in India is growing rapidly. It has given new opportunities in every field Like- in entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activitiy committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, software piracy and so on, which invade our privacy and offend our senses. Criminal activities in the cyberspace are on the rise. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime
Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime

A generalized definition of cyber crime may be  unlawful acts wherein the computer is either a tool or target or both The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.

1. Definitions:
Cyber Crime is defining as an unlawful act where in the computer is either a tool or a target or both.
 Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime
Illegal computer-mediated activities that can be conducted through global electronic networks
Criminal acts using computers and networks as tools or targets
Traditional crimes conducted through the use of computers
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb

Cyber Crime is defining as an unlawful act where in the computer is either a tool or a target or both.
. Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime
Illegal computer-mediated activities that can be conducted through global electronic networks
 Criminal acts using computers and networks as tools or targets
Traditional crimes conducted through the use of computers
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb

2. Cyber Crimes can be Basically Divided into 3 Major Categories
i. Cyber crimes against persons.
ii. Cyber crimes against property.
iii. Cyber crimes against government.

3. Cyber Crimes Against Persons: Cyber crimes committed against persons means there are various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be amplified. This is one Cybercrime which threatens to undermine the growth of the younger generation as also leave irreparable scars and injury on the younger generation, if not controlled. There are two case of cyber crime against persons. A minor girl in Ahmedabad was lured to a private place through cyber chat by a man, who, along with his friends, attempted to gang rape her. As some passersby heard her cry, she was rescued.

Another example wherein the damage was not done to a person but to the masses is the case of the Melissa virus. The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide.

Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other. Persons perpetuating such harassment are also guilty of cyber crimes. Cyber harassment as a crime also brings us to another related area of violation of privacy of citizens. Violation of privacy of online citizens is a Cyber crime of a grave nature. No one likes any other person invading the invaluable and extremely touchy area of his or her own privacy which the medium of internet grants to the citizen.

According to Mr. Pavan Duggal, who is the President of cyberlaws.net and consultant, in a report has clearly defined the various categories and types of cyber crimes.  Cyber crimes can be basically divided into 3 major categories
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.

4. Cyber Crimes Against Persons: Cyber crimes committed against persons means there are various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important Cyber crimes known today. The potential harm of such a crime to humanity can hardly be amplified. This is one Cyber crime which threatens to undermine the growth of the younger generation as also leave irreparable scars and injury on the younger generation, if not controlled. There are two case of cyber crime against persons.  A minor girl in Ahmedabad was lured to a private place through cyber chat by a man, who, along with his friends, attempted to gang rape her. As some passersby heard her cry, she was rescued.

Another example wherein the damage was not done to a person but to the masses is the case of the Melissa virus. The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide.

Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other. Persons perpetuating such harassment are also guilty of cybercrimes. Cyber harassment as a crime also brings us to another related area of violation of privacy of citizens. Violation of privacy of online citizens is a Cyber crime of a grave nature. No one likes any other person invading the invaluable and extremely touchy area of his or her own privacy which the medium of internet grants to the citizen.

5. Cyber Crimes AGAINST property: The second category of Cyber-crimes is that of Cyber crimes against all forms of property. These crimes include computer vandalism (destruction of others' property),, transmission of harmful programmes. A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy.

6. Cyber Crimes Against Government: The third category of Cyber-crimes relate to Cyber crimes against Government. Cyber terrorism is one of the most important kind of crime in this category. The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country. This crime manifests itself into terrorism when an individual cracks into a government or military maintained website. In a report of express India. Com, it was said that internet was becoming a boon for the terrorist organizations. According to Mr. A.K. Gupta, Deputy Director (Co-ordination),, CBI, terrorist are increasingly using internet to communicate and move funds. Lashker-e-Toiba is collecting contributions online from its sympathizers all over the world. During the investigation of the Red Fort shootout in Dec. 2000, the accused Ashfaq Ahmed of this terrorist group revealed that the militants are making extensive use of the internet to communicate with the operatives and the sympathizers and also using the medium for intra-bank transfer of funds.  Cracking is amongst the gravest Cyber-crimes known till date. It is a dreadful feeling to know that a stranger has broken into your computer systems without your knowledge and consent and has tampered with precious confidential data and information. Coupled with this the actuality is that no computer system in the world is cracking proof. It is unanimously agreed that any and every system in the world can be cracked. The recent denial of service attacks seen over the popular commercial sites like E-bay, Yahoo, Amazon and others are a new category of Cyber-crimes which are slowly emerging as being extremely dangerous.

Let us we discuss about the types of cyber crime as we know that the computer is a tool or machine for doing something what ever user want to do some of them uses it for an unlawful act.. This kind of activity usually involves in committing the crime by using computer. Its also to important to know that criminal always take the help of NETWORK to make their root for commit the crime.

7. Classification of Cyber Crimes:
(i), Cyber Pornography: The use of internet is very fastly spreading in Indian household commodity. Under this the children are viable victim to the cyber crime. As more homes have access to internet, maximum children would be using the internet and more are the chances of falling victim under the pedophiles for sex. Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence. Then slowly pedophiles start sexual chat to help children remove their inhibitions about sex and then call them out for personal interaction. Then starts actual exploitation of the children by offering them some money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet. This would include pornographic websites; pornographic magazines produced using computer and the Internet and to publish the material on internet or also through the print outs (to down load and transmit pornographic pictures, photos, writings etc.),, Two known cases of pornography are the Delhi Bal Bharati case and the Bombay case wherein two Swiss couple used to force the slum children for obscene photographs. The Mumbai police later arrested them.

In today’s world parents know the face of dangers and they know how to avoid & face the problems by following simple rules and accordingly they advice their children to keep away from dangerous things and ways. But in case of cyber world, most of the parents do not themselves know about the basics in internet and dangers posed by various services offered over the internet. Hence the children are left unprotected in the cyber world. Pedophiles take advantage of this situation and lure the children, who are not advised by their parents or by their teachers about what is wrong and what is right for them while browsing the internet

ii. Sale of illegal articles: This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail communications. E.g. many of the auction sites even in India are believed to be selling cocaine in the name of 'honey'.

iii. Online Gambling: The world's first online casino, started operating from August 18, 1995, with 18 different games. In fact no business on the Internet earns more revenue than online gambling. Out of the estimated 14.5 million online gamblers, almost 30 per cent are from Asia. A bet can be placed in minutes. Anyone with a credit card can set up an offshore currency account with a gambling site, Though gambling is not illegal, it is a highly controlled and regulated activity. Modern India is a quasi-federal Constitutional democracy and the powers to legislate are distributed at the federal as well as the state levels. There are millions of websites, all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.

iv. Intellectual Property Crimes: Intellectual property (IP), crime is a generic term used to describe a wide range of counterfeiting (duplicate), and piracy offences. Trademark counterfeiting, software piracy and copyright piracy are serious Intellectual Property crimes that defraud consumers, threaten the health of patients, cost society billions of dollars in lost government revenues, foreign investments or business profits and violate the rights of trademark, patent, and copyright owners. Imitation products pose a significant safety threat to consumers worldwide. Intellectual property consists of a bundle of rights. Any unlawful act by which the owner is deprived completely or partially of his rights is an offence. The common form of IPR violation may be said to be software piracy, copyright infringement, trademark and service mark violation, theft of computer source code, etc.

v. Intellectual Property Crimes: Intellectual property (IP), crime is a generic term used to describe a wide range of counterfeiting (duplicate), and piracy offences. Trademark counterfeiting, software piracy and copyright piracy are serious Intellectual Property crimes that defraud consumers, threaten the health of patients, cost society billions of dollars in lost government revenues, foreign investments or business profits and violate the rights of trademark, patent, and copyright owners. Imitation products pose a significant safety threat to consumers worldwide. Intellectual property consists of a bundle of rights. Any unlawful act by which the owner is deprived completely or partially of his rights is an offence. The common form of IPR violation may be said to be software piracy, copyright infringement, trademark and service mark violation, theft of computer source code, etc.

The Hyderabad Court has in a land mark judgement has convicted three people and sentenced them to six months imprisonment and fine of 50,000 each for unauthorized copying and sell of pirated software.

vi. E-Mail spoofing: The oxford dictionary defines Spoofing as Mocking imitation of someone or something A spoofed email is one that appears to originate from one source but actually has been sent from another source. This is also known E-Mail forging. E-mail spoofing is the forgery of an e-mail, so that the message appears to have originated from someone or somewhere other than the actual source. Recently spoofed mails were sent on the name of Mr. Na.Vijayashankar (naavi.org),, which contained virus.
Rajesh Manyar, a graduate student at Purdue University in Indiana, was arrested for threatening to detonate a nuclear device in the college campus. The alleged e- mail was sent from the account of another student to the vice president for student services. However the mail was traced to be sent from the account of Rajesh Manyar.
Examples of spoofed email that could affect the security of your site include:
1. E-mail claiming to be from a system administrator requesting users to change their passwords to a specified string and threatening to suspend their account if they do not do this.
2. E-mail claiming to be from a person in authority requesting users to send them a copy of a password file or other sensitive information.

vii. Forgery: An illegal modification or reproduction of an instrument, document, signature, or legal tender, or any other means of recording information. An item is also considered forged if it is claimed that it was made by someone who did not make it. Counterfeit currency notes, postage and revenue stamps, mark sheets etc., is also can be forged using sophisticated computers, printers and scanners. A person commits forgery if he:
1. makes any false document or any part of it,
2. With an intent to:
2.1 Cause damage or injury to the public or any person,
2.2 Support any claim or title,
2.3 Cause any person to part with property
2.4 Cause any person to enter into express or implied contract,
2.5 Commit any fraud or that the fraud may be committed

viii. Cyber Defamation: This occurs when defamation takes place with the help of computers and or the Internet e.g. someone published defamatory matter about someone on a websites or sends e-mail containing defamatory information to all of that person’s

ix. Cyber Stalking: Although there is no universally accepted definition of cyberstalking, the term is used in this report to refer Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following the victim, making harassing phone calls, killing the victims pet, appearing at a person’s home or place of business, leaving written messages or objects,. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker. Both kind of Stalkers are in this world that is Online & Offline stalkers – have desire to control the victims life. Majority of the stalkers are the dejected lovers or ex-lovers, who then want to harass the victim because they failed to satisfy their secret desires. Most of the stalkers are men and victim female.

x. Theft of information contained in electronic from: This includes information stored in computer hard disks, removable storage media etc. Theft may be either by appropriating the data physically or by tampering them through the virtual medium.

xi. E-Mail bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in the victims’ e-mail account or mail servers which may be an individual or a company or even mail servers there by ultimately resulting into crashing. There are two methods of E-Mail Bombing
1. Mass mailing
2. List linking

Mass Mailing: Mass mailing consists of sending numerous duplicate mails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. This type of attack is more difficult to defend against than a simple mass-mailing bomb because of the multiple source addresses and the possibility of each zombie computer sending a different message or employing stealth techniques to defeat spam filters.

List Linking: List linking means signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. In order to prevent this type of bombing, most email subscription services send a confirmation email to a person's inbox when that email is used to register for a subscription. This method of prevention is easily circumvented: if the perpetrator registers a new email account and sets it to automatically forward all mail to the victim, he or she can reply to the confirmation emails, and the list linking can proceed.

xii. Data Diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed. Also define as Data diddling is the changing of data before or during entry into the computer system. Electricity boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems. It is also known as tampering. For Examples include forging or counterfeiting documents used for data entry and exchanging valid disks and tapes with modified replacements.

xiii. Salami Attacks: Those attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. A bank employee inserts a program into bank’s servers, that deducts a small amount (2.50 rs pm), from the account of every customer. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.

xiv. Data Diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed. Also define as Data diddling is the changing of data before or during entry into the computer system. Electricity boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems. It is also known as tampering. For Examples include forging or counterfeiting documents used for data entry and exchanging valid disks and tapes with modified replacements.

xv. Salami Attacks: Those attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. A bank employee inserts a program into bank’s servers, that deducts a small amount (2.50 rs pm), from the account of every customer. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.

xvi. Logic bombs: These are dependent programs. This implies that these programs are created to do something only when a certain event occurs, e.g. some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date.

xvii. Trojan Horse: A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. One example of Trojan Horse There are many simple ways of installing a Trojan in someone's computer. There were, two friends Rahul and Mukesh (names changed),, had a heated argument over one girl, Radha (name changed), whom they both liked. When the girl, asked to choose, chose Mukesh over Rahul, Rahul decided to get even. On the 14th of February, he sent Mukesh a spoofed e-card, which appeared to have come from Radha's mail account. The e-card actually contained a Trojan. As soon as Mukesh opened the card, the Trojan was installed on his computer. Rahul now had complete control over Mukesh's computer and proceeded to harass him thoroughly.

xviii. Internet Time Theft: Basically, Internet time theft comes under hacking. This connotes the usage by unauthorized persons of the Internet hours paid for by another person. The person who gets access to some one else’s ISP user ID and password, either by hacking or by gaining access to it by illegal means, uses it to access the Internet without the other person’s knowledge. You can identify time theft if your Internet time has to be recharged often, despite infrequent usage.

xix. Physically Damaging a Computer System: This crime is committed by physically damaging a computer or its peripherals.
xx. Web Jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money. E.g. recently the site of MIT (Ministry of Information Technology), was hacked by the Pakistani hackers and some obscene matter was placed therein. Further the site of Bombay crime branch was also web jacked. Another case of web jacking is that of the ‘gold fish’ case. In this case the site was hacked and the information pertaining to gold fish was changed. Further a ransom of US $ 1 million was demanded as ransom. Thus web jacking is a process where by control over the site of another is made backed by some consideration for it.

8. Characteristics of Computer Crime:
1. Silent in Nature: Computer crime could be committed in privacy without reaching to scene of crime physically i.e. no eye witnesses. There is no signs of physical violence or struggle.
2. Global in character: No national borders. By sitting comfortably far away from the country the entire economy of the country could be destroyed. As digital evidences are fragile in nature one has to respond quickly.
3. Non existence of Physical Evidence: No physical evidence to indicate that crime has been committed. Only on a closer look the trained person could find out the evidences which are not in the traditional format but are in digital format.
4. Creates high Impact: Impact is severe and may be long term. It can damage the victim system permanently. Loss of good will.
5. High Potential and Easy to Perpetrate: A software developer who did not get enough money or good job would turn to criminal world for their survival. Therefore, the computer crimes have a potential to increase. Hence organized mafia may enter into this sector.

Punishment to the Cyber Criminals:
Cybercrime must be dealt with very seriously because it causes a lot of damage to businesses and the actual punishment should depend on the type of fraud used. Penalties relating to cyber crime will vary depending on the country and legislation in place. Information Technology Act-2000: According to this act, different penalties are available for different crimes. Some of the penalties are as follows:

The penalty for illegally accessing a computer system imprisonment ranges from 6 months to 5 years.
2. The penalty for the unofficial modification on a computer imprisonment ranges from 5 to 10 years.
3. Telecommunication Service Theft: The theft of telecommunication services is a very common theft and is punished with a heavy fine and imprisonment.
4. Communications Intercept Crime: This is a Class-D crime which is followed by a severe punishment of 1 to 5 years of imprisonment with a fine. Other cyber crimes like telecommunication piracy, offensive material dissemination, and other cyber frauds also belong to this category.
5. Computer Source Document Tampering: The person who changes the source code on the website or any computer program will get a punishment up to 3 years of imprisonment or fine
6. Computer Hacking: The individual who hacks the computer or computer devices will get an imprisonment up to 3 years or a fine.
7. Government Protected System: An act of trying to gain access to a system which is a protected system by the government, will result in imprisonment for 10 years and a heavy fine.
8. Sending Offensive Messages Through Communication Service: if any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, criminal shall be punishable with imprisonment for a term which may extend to three years and with fine.
9. Punishment for Identity Theft: Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh.
10. Punishment for Violation of Privacy: Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both
11. Pornography Publish: Records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with a fine which may extend to ten lakh rupees and in the event of second or subsequent conviction with imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees
12. Penalty for Misrepresentation: Whoever makes any misrepresentation to, or suppresses any material fact from, the Controller or the Certifying Authority for obtaining any license or Electronic Signature Certificate, as the case may be, shall be punished with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.
13. Punishment for Theft: Whoever commits theft shall be punished with imprisonment of either description for a term which may extend to three years, or with fine, or with both.
14. Forgery 14.1. Whoever commits forgery, shall harm the reputation of any party, or knowing that it is likely to used for that purpose, shall be punished with imprisonment which may extend to three years, and shall also be liable to fine.
14.2. Whoever commits forgery shall be punished with imprisonment, which may extend to two years, or with fine or both.
14.3. Where the forgery is committed with intent to cheat then the punishment shall extend to seven years and will also be liable to fine.
14.4. Where there is fraudulent cancellation or destruction of the will, authority to adopt or valuable security, then the person committing such mischief shall be punished with imprisonment for life, or imprisonment which may extend to seven years, and shall also be liable to fine (Sect.477),

9. Conclusion and Recommendation: The computer crime is a great social danger and with the information highway having entered our very homes, we are all at increasing risk of being affected by Cyber crime. Everything related to our lives is in some manner affected by computers and cyber crime. Cyber crime is everyone’s problem. And its time we did something to protect ourselves. Information is the best form of protection.

Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime. is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. Each individual who is a computer user in a network should be aware, The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society), and further making the application of the laws more stringent to check crime. Undoubtedly the Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime. I would conclude with a word of caution for the pro-legislation school that it should be kept in mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive. Each individual that is a computer user for private or duty purposes should be aware of the danger and should use specialized original software for protection from computer attacks and viruses so that risks of injury are minimized.

References:
1.    Sunny Vaghela (Director & Chief Technical Officer at Tech defense consulting Pvt Ltd),
2.    Cyber crime Head quarter Bangalore
3.    Rohas Nagpal is the founder President of Asian School of Cyber Laws.
4.    Sify News 14.03.03
5.    Hindustan Times 03.03.03
6.    Indian cyber law
7.    Parthasarathi Pati
8.    www.cybercrime.com
9.    www.indiaitact2000.com