

Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. The easy access to the pornographic contents readily and freely available over the internet lowers the inhibitions of the children. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. They extort money from some corporate giant threatening them to publish the stolen information which is critical in nature.

Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. They possess the quality to enter in to target computer and obtain the data. Hackers write or use ready-made computer programs to attack the target computer. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system. The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. For example hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet."Ī generalized definition of cyber crime may be "unlawful acts wherein the computer is either a tool or target or both". Additionally, cyber crime also includes traditional crimes conducted through the Internet. "Cyber crime encompasses any criminal act dealing with computers and networks (called hacking).
