Introduction In addition to nation-state players, the cyber world is also filled with well-organized criminal groups, independent terrorist groups, and "just for fun" hackers of all stripes. Each offers a particular kind of threat that calls for a complex, varied response. Since the potential threat is a natural part of the internet and hence cannot be completely erased, we refer to the issue as embedded. In traditional warfare, governments have to spend considerable financial and personnel resources on every front—land, air, and sea—but in cyberspace, a single person may wipe out an entire nation. Nuclear weapons need a lot of work to construct, whereas cyber weapons may demonstrate immense harm without costing a dime. Regarding national security, cyber threats have the capacity to endanger the integrity of crucial infrastructure, disrupt the financial system, permit the theft of intellectual property and trade secrets, and deteriorate ties between the government and its
“ Crime and bad lives are the measure of a state’s failure, all crime in the end is the crime of the community .” ~ H.G Wells All of us in the present time must have come across the term cyber crime in our daily lives at some or other time. With the expanding horizons of the internet, criminal activities have also expanded their reach over the virtual world. Cyber crime is the common denomination given to activities which use a computer device to further illegal activities like fraud, trafficking, forgery, breaching privacy etc. With every passing year, the rate at which these activities take place has grown tenfold. Between, 2012 and 2018, cyber crime incidents registered were around 90,000. According to data published in 2020, the rate of cyber crimes against children has increased by 400%.Therefore, a constant vigil is required to keep the cybercrimes in check. Since, the cybercrimes are conducted using technologically advanced tools, a special legislation was required to