A BASIC OVERVIEW OF CYBERCRIMES: WHAT YOU NEED TO KNOW

The last twenty years have seen an explosion in the development of information technology, to the point that people spend a major portion of their life in online spaces.

While there are enormous benefits associated with this technology, there are also risks that can affect the most vulnerable in our society but also the most confident through cybercrimes.  In this exposition the author wants to give an overview of what cybercrime is all about.

Generally, cybercrime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. It can also be aptly defined as a criminal activity that involves a computer, networked device or a network. It is very difficult to classify crimes in general into distinct groups as many crimes evolve on a daily basis. Even in the real world, crimes like rape, murder or theft need not necessarily be separate. However, all cybercrimes involve both the computer and the person behind it as victims, it just depends on which of the two is the main target. Hence, the computer will be looked at as either a target or tool for simplicity’s sake. For example, hacking involves attacking the computer’s information and other resources.

Seemingly, the link between cybercrime and national security has become increasingly prevalent, as technology has advanced the criminal capacity to cause harm and annoyance to individuals and a nation’s critical infrastructure by undermining its vital instrumentalities.

 A primary effect of cybercrime is financial. Cybercrime can include many different types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal financial account, credit card or other payment card information.

Though law enforcement agencies globally and in particular African Police Services are trying to tackle this problem as it is growing regularly and many people have become victims of identity theft, hacking and cyber harassment amongst other cybercrimes. One of the best ways to stop these criminals and protect sensitive information is by making use of inscrutable security that uses a unified system of software and hardware to authenticate any information that is accessed over the Internet.

The promulgation of the Data Protection Act [Chapter 11:22] in Zimbabwe has brought hope to netizens as the Act’s objective is meant to increase data protection in order to build confidence and trust in the secure use of information and communication technologies by data controllers, their representatives and data subjects

It is prudent to note in the foregoing overview that cybercriminals may target an individual’s private information or corporate data for theft and resale. As many workers settle into remote work routines due to the pandemic, cybercrimes are expected to grow in frequency over the coming years, making it especially important to protect backup data.

What are the causes of Cybercrime?

Cybercriminals always opt for an easy way to make big money. They target rich people or rich organizations like banks, casinos, and financial firms where a huge amount of money flows daily and hack sensitive information. Apprehension of such criminals is difficult, though law enforcements agents rely mostly on digital footprints to account for them. Computers are vulnerable, hence there is need for information security ordnances or policies to protect and safeguard them against cybercriminals. Here are some of the reasons for the vulnerability of computers and networked devices:

Easy accessibility – The problem behind safeguarding a computer system from unauthorized access is that there are many possibilities of breach due to the complex technology. Hackers can steal access codes, retina images, advanced voice recorders, etc. that can fool biometric systems easily and bypass firewalls can be utilized to get past many security systems.

Technical Gaps – Computers run on operating systems and these operating systems are programmed with millions of codes. The human mind is imperfect, so it can be prone to mistakes at any given stage. Cybercriminals take advantage of these gaps.

Negligence – Negligence is one of the characteristics of human conduct. So, there may be a possibility that while protecting the system computer or any networked device we may be negligent thus providing cyber-criminals access and control over the networked device or computer system. Human error has been identified as the major cause of data breaches.

Unlimited Internet Access

By using internet, we have given convenience in accessing without any limitations. This is the foremost factor which causes cybercrime as most people are now glued to online activities. An Increased use of electronics in daily life, penetration of internet and irresponsible use of technology are some of the problems causing cybercrime.

Conclusion

Crime and criminality have been associated with man since his fall. Crime remains elusive and ever strives to hide itself in the face of development. Different nations have adopted different strategies to contend with crime depending on their nature and extent. To tackle cybercrime effectively, there is need to establish multidimensional public-private collaborations between law enforcement agencies, the information technology industry, information security organizations, internet companies, and financial institutions.  Unlike the real world, Cybercriminals do not fight one another for supremacy or control. Instead, they work together to improve their skills and even help out each other with new opportunities. Hence, the usual methods of fighting crime cannot be used against cybercriminals.

About the author:  Nyasha Alford  is a passionate, talented cybersecurity professional and cybercrime fighter with vast international and regional experience. As an experienced senior law enforcement officer and a holder of a Master degree coupled with multi certifications in cybercrime investigation and forensics enjoys to share his experience through training and awareness. He also writes in his own capacity. 

 

Leave A Comment

Get Certificate

Get Quality Skills Certificate From Carlss

Get Started Now
img