Cyber Crimes are the activities in which computers or networks are tools, targets, and places of criminal activities. This is also known as computer crimes. It is a lawbreaking violation of section 1030 of the United States of American Legal Code. It refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more category.
Furthermore, Cyber Crime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used to facilitate the illicit activity.
Cyber crime is also a criminal activity involving an information technology infrastructure including: illegal access or unauthorized access, illegal interception by technical means of non-public transmissions of computer data to, from or within a computer system, data interference by unauthorized damaging, deletion, deterioration, alteration or suppression of computer data, systems interference by interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data, misuse of devices, forgery of ID and theft, and electronic fraud.
Looking back, in the beginning of civilization, human race was eager in discovering new things for their survival. The development of civilization came to be more amazing until the modern civilization. Modern civilization saw continued transformation in the areas of technology and infrastructure. One of the common Technologies that continuously grow is this computer. Computer evolved to become one of the basic necessities of every professional individual.
There is a body of information that has to be considered before one can effectively and efficiently use computer as a machine for communication. For example, as the information age progresses, new forms of criminal behavior appeared. Crime of the future quickly became the present. The constancy of crime trends achieved by the shoe-horning of crime facts into legal groups is blinding.
White-collar crime like cyber crime lack real data by criminal statistics. Routine activity theory suggests that crime may occur while a motivated offender and suitable victim meet in the absence of a competent guardian (Jones & Newburn, 1998). In “meat space”, the number of such coincidences is limited by the speed at which people can pass through their spatial environment. In cyberspace, this is not the case. Very large numbers of people can be defrauded at once. These possibilities for fraud are almost unlimited, since the e-identities are multitude behind which an offender can hide, besides the complications of the network as venue.