Information on Cyber-Crime
In the start of a particular development period, people were quietly driven to accomplish decent progress in prevailing technological activities. From the beginning of civilization, humans have always been inspired by necessities to make better technologies to make life easier and more comfortable.
In 1969, the design of a super parallel network called ARPANET (Advanced Research Project Agency) was made. ARPANET was composed of more than fifty computers connected with web links to facilitate military operations. These networks gradually grew and later became popular by the name of The Internet, to share business systems where communication was carried out in “Cyberspace.”
The term Cyberlaw denotes the legal jurisdiction and other means of previous regulatory aspects on the internet. This process is a constantly generic one. At the time when an internet development strategy is made, various modifications are enforced during its development, as a result of which various legal concerns also gets developed via illicit activists. Child Pornography is one of the most severe cybercrimes. Online pedophiles devise ways to engage kids in sexual activities using the Internet. Likewise, the traffic threats, distribution of indecent material, and posting of pornography with all its dirty exposure are some of the most significant known criminal cyber offenses nowadays. Such offenses, in reality, impends to defy the development of technology and also leave a perpetual scar and destruction on the younger generation, if not restricted.
In the world of cybercrime, a rather distinctive form of harassment is Cyber annoyance. Several types of harassment occur in cyberspace or by using cyberspace to reach criminal offenses. Different forms of harassment can be racial, sexual, religious, or any other. People involved in executing this form of harassment are guilty of cybercrimes. Harassment and Stalking are among issues that numerous people, particularly women, face in real-life.
One more type of cybercrime, is cybercrime against property in varied forms.
Such criminal offenses consist of unsanctioned computer trespass via cyberspaces, destruction of computer, and transmission of harmful programs and unauthorized tenure of computerized information. Until presently, cracking and hacking are among the largest known cybercrimes. Hacking is known as breaking into a computer system without the will and knowing of the authorized person, interfering with the valuable and private information or data. Utilizing one's programming capabilities as well as hiring different programmers to attain access to a network or a specific computer via unauthorized access are among serious criminal offenses. Similarly, the making and distribution of damaging computer programs or any type of nasty viruses or software which causes permanent damage to network or computer systems are another type of cybercrime; software piracy is a discrete form of cybercrime. Numerous people in the cyber world disseminate illegal and unofficial pirated copies of software products for monetary benefits.
Another form of cybercrime is a crime against government administration, or also known as Cyber Terrorism.
With the exponential increase in the use of the internet, several nation-state individuals or groups have arisen which use cyberspace to threaten the worldwide governments and to terrify the residents of the country. This crime exhibits when a group or an individual "cracks" or hacks into a military or government maintained website. We can classify cyber-crimes into three broad categories which are: 
1)    Crime against the Individuals
It can be further categorized into crimes against:
Person
Property of an individual.
2)    Crime against Organization
It can be further categorized into crimes against:
Government
Any Firm, Company, or Group of Individuals.
3)    Crime against Society
Below mentioned are examples of some specific crimes which are committed against the above mentioned different groups 
Crimes against Individuals
a.    Cyber-stalking.
b.    Harassment through electronic mails
c.     Email spoofing.
d.   Defamation.
e.     Indecent or Offensive exposure.
f.      Broadcasting indecent material.
g.   Unauthorized control/access over network or computer system.
h.   Cheating.
i.      Fraud.