The facilities of computer technology have not come out without drawbacks. Though it makes the life so speedy and fast, but hurled under the eclipse of threat from the deadliest type of criminality termed as 'Cyber-crime’ without computers, entire businesses and government operations would almost cease to function. This proliferation of cheap, powerful, user-friendly computers has enabled more and more people to use them and, more importantly, rely on them as part of their normal way of life. As businesses, government agencies, and individuals continue to rely on them more and more, so do the criminals Restriction of cyber crimes is dependent on proper analysis of their behavior and understanding of their impacts over various levels of society. Therefore, in the current manuscript a systematic understanding of cyber-crimes and their impacts over various areas like Sochi-eco-political, consumer trust, teenager etc. with the future trends of cyber crimes are explained. Computer crime is the use of information technology in any suspicious criminal activities. Recently, ourlife becomes increasingly depending on modern information technology; however, it becomes very important to improve the computer crime investigation procedure especially in cases of processing very important and sensitive information such as government and military intelligence, banking information or personal private information. Cybercrime investigation helps detecting unauthorized access to any digital source information with the intent of modifying, destroying or stealing that digital data or information. Such suspicious actions can cause financial damages or important information loss; moreover, it might distribute or destroy high secret and private or confidential information. Therefore, this paper focuses mainly on highlighting the main challenges of the Indian States (Maharashtra, Karnataka, Delhi and Hyderabad) in computer crime investigation system by taking a look at the recent developments in the continent’s Internet infrastructure and the need of information security laws in these particular countries. Over the past ten years, crime (traditionally based in the world of physical entity) has been increasingly making its way into the world of information. Crime is evolving; since the days when goods were transported by stagecoach, robbery has changed to keep up, even to our modern-day equivalent-credit and debit cards. Internet credit card number theft has become a well-recognized danger. The most common forms of computer crime reported to Inter -GOV include child pornography, fraud, and e-mail abuse. Even more disturbing are new forms of cyber-terrorism made possible by the large amount of the physical machinery now operated by computers. In this article, after attempting to define computer crime, we examine the types that have been committed in the past, and the new types likely to appear in the future. We also examined the difficulty in detecting and measuring computer crime, methods for attempting to prosecute or prevent such crimes, and the effectiveness of these measures. This article evaluates the concepts of computer crimes, detection and the controls. The paper finally exposed us to dangers it poses to organizations, factors that encourage it, and recommending possible controls and preventive measures against computer crimes. Cybercrime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. The Cybercrime can halt any railway where it is, it may misguide the planes on its flight by misguiding with wrong signals, it may cause any important military data to fall in the hands of foreign countries, and it may halt e-media and every system can collapse within a fraction of seconds. The present study has been undertaken to touch some aspects, effect and prospects of this cyber-technology with special reference to threat poses of Cybercrime by India. Efforts have been made to analyze legal framework available for its control in India. To start with, it is, therefore, necessary to demarcate the dimensions of word ‘crime’. Thus it is beyond doubt that ‘crime’ is a relative phenomenon, universal in nature and essentially all societies from ancient to modern have been evidently demonstrating its presence. Each society have been providing its own description of criminal behavior and conduct made punishable by express will of the political community ruling. Over the society and it was always influence by religious-social-political economical values prevailing in the given society. Thus from time immemorial the behavior that attracts ‘penal liability’ influenced and characterized by overall outcome of these standards. Parenthetically, just as concept of crime [has undergone] change with the growth of Information Technology so the categories of criminals who engage in such crimes. So far Indian society is concerned, particularly during ancient period, the definition of crime flagged by religious interpretation. The period was known for complete dominance of religion. All political and social activities in general and 'Crime' in particular, considered to be happened due to the presence of super-natural power. The Demonological theory of crime causation was an outcome of this period. Due to the revolution of communication and information technology the use of internet has been enlarged which increases the rate of digital crime all over the world. Digital crime can be defined as “crimes directed at digital devices or their application systems.” It is very important to secure sensitive information that are processed over the web (Internet) such as government and military intelligence, banking information or personal private information. Nowadays, our life becomes increasingly depending on modern information technology; however, it becomes very important to improve the computer crime investigation procedure especially in case of processing very important and sensitive information. Computer crimes may include different suspicious activities such as machine unauthorized access, digital frauds, system interference as well as computer misuse which might not involve any type of machine physical damage. In fact, computer crime is not just unauthorized access to a computer system with intent to delete, modify or damage computer data and information but it's so far more complex. It can be any type of information. The purpose of this paper is therefore to highlight the main challenges of the Indian States (Maharashtra, Karnataka, Hyderabad and Delhi) in computer crime investigation system, by taking a look at the recent developments in the continent’s Internet infrastructure and the need of information security laws in these particular countries.