Cybercrime – A matter of concern

Opinion Oct, 25 2022
Cybercrime – A matter of concern
  • 236
  • 0

Crime is a word used for wrong deed or offence, but when it comes to cybercrime then, it can be defined as a crime done by internet to cause an immeasurable loss to the individual, organization, or the government.

Cybercrime is a punishable offence committed by cyber criminals. Rapid technological growth and developments have provided vast areas of new opportunity and efficient sources for organizations of all sizes. Technological growth is majorly backed by the internet. The internet has brought distant objects closer, in other words, it makes the world small.  

The internet has now become a national asset, the whole national security is also depending on it. But these new technologies have also brought unprecedented threats with them. Everybody thinks that only stealing someone’s private data is Cyber Crime. But in defining terms we can say that ‘Cyber Crime refers to the use of an electronic device (computer, laptop, etc.) for stealing someone’s data or trying to harm them using a computer.

Besides, it is an illegal activity that involves a series of issues ranging from theft to using your system or IP address as a tool for committing a crime. Classification of Cyber Crimes:

• CRIME IN CONTRADICTION OF AN INDIVIDUAL: This is the form of cyberstalking, trafficking, and grooming. Over the years, this type of cybercrime has been taken seriously by law enforcement agencies. It is now keeping a track over every such attack on an individual.

• CRIME IN CONTRADICTION OF AN ORGANIZATION: This is done against a firm, company or organization to get unauthorized access to the data. This is done either to reveal the important data and employee details of the company or for money-making.

• CRIME IN CONTRADICTION OF GOVERNMENT: These types of crimes are denoted as cyber terrorism. This can be a terror because the attacker can get hold of essential documents related to government projects. An enemy nation or terrorist usually makes such attacks. There are many cases globally where a terrorist hacks government data. Apart from these, there is a financial crime where the hacker steals the money of the user account holder.

Moreover, they steal company data and finance. Cybercrime is the most discussed issue of the 21st century. The technology sector worldwide is witnessing  a boom in the consumer of smartphones and the internet which is raising concerns with regard to the privacy and security of the users.

Owing to this reason, it is highly essential for all the users to know about cybercrime and security. There are many types of cyber-crimes and the most common ones are explained below:

• HACKING: In this type, the computer system of the person is hacked to get personal information. In many countries, including India, hacking is a punishable act. It is quite different from ethical hacking. In normal hacking, illegal use different types of software to enter the system of the target person. Hacker is then able to monitor every activity done by the person. 

• THEFT: This crime occurs when a person violates copyrights and downloads music, movies, games, and software. There are even peer-sharing websites that encourage software piracy and many of these websites are now being targeted by the FBI. Today, the judicial system is addressing this cyber crime and there are laws that prevent people from illegally downloading. Film producers and directors often become victims of this crime. 

• CYBER STALKING: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyberstalking is not having the desired effect, they begin offline stalking along with cyberstalking to make the victims’ lives more miserable.

• IDENTITY ROBBERY: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber-crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card, and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.

• COMPUTER VANDALISM: Computer vandalism is a type of malicious behavior that involves damaging computers and data in various ways and potentially disrupting businesses. Typical computer vandalism involves the creation of malicious programs designed to perform harmful tasks such as erasing hard drive data or extracting login credentials. Computer vandalism differs from viruses, which attach themselves to existing programs. We could list the following reasons for the susceptibility of computers:

• RELAXED TO ACCESS – The problem behind protection of a computer system from unauthorized access is that there are many possibilities of breach due to the complex technology. Hackers can steal access codes, retina images, advanced voice recorders, etc. that can fool biometric systems easily and bypass firewalls can be utilized to get past many security systems.

• VOLUME TO STORE DATA IN REASONABLY SMALL SPACE – The computer has the unique characteristic of storing data in a very small space. This makes it a lot easier for people to steal data from any other storage and use it for their own profit.

• MULTIFACETED – The computers run on operating systems and these operating systems are programmed with millions of codes. The human mind is imperfect, so it can do mistakes at any stage. Cybercriminals take advantage of these gaps.

• CARELESSNESS – Negligence is one of the characteristics of human conduct. So, there may be a possibility that protecting the computer system we may make any negligence that provides cyber-criminal access and control over the computer system.

• LOSS OF PROOF – The data related to the crime can be easily destroyed. So, Loss of evidence has become a very common & obvious problem that paralyzes the system behind the investigation of cyber-crime.

Published in The Daily National Courier, October, 26 2022

Like Business on Facebook, follow @DailyNCourier on Twitter to stay informed and join in the conversation.

NC Big Stories

IDEAS 2024 solidifies Pakistan position as a key player: Murad

KARACHI: Sindh Chief Minister Syed Murad Ali Shah has said that IDEAS 2024 has further solidified Pakistan’s position as a key player in global defence and diplomacy, with the nation firmly committed to fostering peace through strength and coll...

Gunmen kill 42, attacking passengers’ vehicles in Kurram district

ISLAMABAD: At least 42 people were killed and several others injured when unidentified gunmen opened fire on a convoy of passenger vehicles in Kurram district, Khyber Pakhtunkhwa (K-P), yesterday. The attack occurred in the remote Ochut area, a mount...

Sindh CM urges federal govt to convene CCI meeting

KARACHI: Chief Minister (CM) Sindh Murad Ali Shah urged the federal government to convene meeting of the Council of Common Interest (CCI). As per details, the Sindh CM said that Article 154 (3) made it mandatory for the federal government to summon t...

The favorite star of Hum TV & Farhat Ishtiaq

Ahad Raza Mir, one of the brightest stars of the current generation, is known for his diverse roles and successful career. As the son of the legendary Asif Raza Mir, Ahad quickly carved out his own place in the entertainment industry with a unique se...

More like this
Related

A Glimpse into the Future of Defense and Technology

The International Defence Exhibition and Seminar (IDEAS) in Karachi, held every two years, has become one of the most prominent defense and technology exhibitions in South Asia. The 2024 edition promises to be a monumental event, showcasing the lates...

IDEAS 2024: Pakistan's premier defense exhibition in full swing

Pakistan's premier defense exhibition, IDEAS 2024, is moving ahead in full swing at the Karachi Expo Centre. This 12th International Defence Exhibition and Seminar promises to be a spectacular showcase of military hardware, technology, and innovation...

Pros and cons of agri taxes

The five-day negotiations between Pakistan and the IMF delegation were completed last week, in which the most important thing is that the federal government has assured the International Monetary Fund to impose tax on agricultural income in the provi...

IDEAS-2024: A Remarkable Step Forward

By Dr Zia Ul Haque Shamsi The post-Cold War security architecture is evolving, and the international system is preparing itself for the realities of multipolarity instead of continuing with the US-led unipolarity. Likewise, the regional strategic pri...
Need Help? Chat with us