THE LINGERING
GLOBAL CYBER CRIME, AND ITS CONSEQUENCE
Computer hacking in a concise term, is
the act of breaking into someone else’s computer systems, especially in order
to acquire secret information that is stored there. In the same vein, a
computer hacker is someone who tries to break into computer systems belonging
to others for the purpose of getting secret or confidential information stored
in them.
Frankly, internet/computer hacking which constitutes the most recent cyber crimes, is real and really eating deep in the global internet connectivity, therefore requires an urgent and a drastic measure to ensure that it is totally put to stop.
Apart from internet hacking which is
widely in circulation and also seen as a lucrative venture by the perpetrators,
there are other many internet/cyber criminal acts taking place globally on a
daily basis, which include the ones occurring on the numerous existing social
media.
Prior to the invention of the Internet,
criminals had to dig through people’s trash or intercept their mails to steal
their personal information. Now that all the required information is available
online, criminals presently use the Internet to steal people’s identities, hack
into their accounts, trick them into revealing the information, or infect their
devices with malware otherwise known as computer threat, such as the famous
computer virus.
Most cyber crimes are committed by
individuals or small groups. Though large organized criminal groups also take
advantage of the Internet. These so-called professional criminals find new ways
to commit old or ancient crimes. They treat cyber crimes like a business and
form global criminal communities. Criminal communities share strategies and
tools and can combine forces to launch coordinated attacks. They even have an
underground marketplace where cyber criminals can purchase and sell stolen
information or identities.
It’s very difficult to track cyber
criminals down, because the Internet makes it easier for people to do things
anonymously and from any location on the globe. Needless to say that, many
computers used in various destinations have actually been hacked and are being
controlled by someone far away.
For hackers who want to come clean and turn away from crime out of pretence, one option is to work for the people they used to torment by becoming their security consultants or employees. These set of hackers are referred to as “Grey Hat Hackers”. In the past, they were addressed as “Black Hat Hackers” who used their computer expertise to break into systems and steal information illegally while posing as a friend or dedicated employee/consultant. But presently, some of them are acting as “White Hat Hackers” who specialize in testing the security strength of their clients’ information systems.
If the interest of the aforementioned set of hackers (White Hat Hackers) is to be paid, they will attempt to hack into a company’s network and then present the affected company with a report detailing the existing security loopholes of the company and how those anomalies could be tackled. The advantage of this is that, they can use their skills for a good cause and help stop other cyber criminals, since keeping up with security and cyber criminals is a fulltime job and many companies can’t afford financially to have someone totally dedicated to it.
Another recent devastating aspect of
internet hacking is the “Social Engineering” routine. Social engineering is a
tactic used by cyber criminals that use lies and manipulations to trick people
into revealing their personal information. Social engineering attacks
frequently involve very convincing fake stories to lure victims into their
trap. Some of these tricks include:
v
Sending victims
an email that claims there’s problem with their account and has a link to a
fake website.
v
Trying to convince victims to open email
attachments that contain malware, pretending to be a network/account
administrator and asking for the victim’s password to perform maintenance
activity.
v
Claiming that the
victim has won a prize but must give their credit card information in order to
receive it.
v
Promising the victims that they will receive
millions of dollars if only they will help out the sender by giving them money
or disclosing their bank account details, just to mention but a few.
The recent dimensions of cyber crimes,
which are becoming funny, barbaric and deadly, have called for constant and
consistent update of advanced anti-hacking computer software by software
producers, and the adequate dissemination of the said software to the apt
quarters. Presently most developing countries are less-privileged in regard to
advanced anti-hacking or anti-malware software.
On the other hand, a strict and grievous
law regarding cyber crime ought to be implemented by all the countries in the
world. Also, thoroughly equipped Internet Communication Agencies
comprising well experienced experts are expected to be established by the
respective countries.
The bill regarding Cyber Crime that is
presently lying on the floor of the Nigeria’s National Assembly is a way
forward and a right step in the right direction, but it should be passed into
law in earnest. And when signed into law, ought to as a matter of urgency be
implemented by the executive arm.
Those involved in these criminal acts with the sole aim of bankrupting their victims should endeavour to turn a new leaf to exonerate themselves from the dangers that will surely befall them.
Above all, the potential victims either
individuals or corporate organizations, must also take precautions of the aforementioned
internet or computer scams in order not to exclaim ‘Had I known’.
COMR. FRED
NWAOZOR
Public Affairs analyst & Social activist
________________________________
+2348054719437
No comments:
Post a Comment