Friday 22 August 2014

The Lingering Global Cyber Crimes (Aired Newstalk)


THE LINGERING GLOBAL CYBER CRIME, AND ITS CONSEQUENCE

Computer hacking in a concise term, is the act of breaking into someone else’s computer systems, especially in order to acquire secret information that is stored there. In the same vein, a computer hacker is someone who tries to break into computer systems belonging to others for the purpose of getting secret or confidential information stored in them.    

Frankly, internet/computer hacking which constitutes the most recent cyber crimes, is real and really eating deep in the global internet connectivity, therefore requires an urgent and a drastic measure to ensure that it is totally put to stop.

Apart from internet hacking which is widely in circulation and also seen as a lucrative venture by the perpetrators, there are other many internet/cyber criminal acts taking place globally on a daily basis, which include the ones occurring on the numerous existing social media.

Prior to the invention of the Internet, criminals had to dig through people’s trash or intercept their mails to steal their personal information. Now that all the required information is available online, criminals presently use the Internet to steal people’s identities, hack into their accounts, trick them into revealing the information, or infect their devices with malware otherwise known as computer threat, such as the famous computer virus.

Most cyber crimes are committed by individuals or small groups. Though large organized criminal groups also take advantage of the Internet. These so-called professional criminals find new ways to commit old or ancient crimes. They treat cyber crimes like a business and form global criminal communities. Criminal communities share strategies and tools and can combine forces to launch coordinated attacks. They even have an underground marketplace where cyber criminals can purchase and sell stolen information or identities.

It’s very difficult to track cyber criminals down, because the Internet makes it easier for people to do things anonymously and from any location on the globe. Needless to say that, many computers used in various destinations have actually been hacked and are being controlled by someone far away.

For hackers who want to come clean and turn away from crime out of pretence, one option is to work for the people they used to torment by becoming their security consultants or employees. These set of hackers are referred to as “Grey Hat Hackers”. In the past, they were addressed as “Black Hat Hackers” who used their computer expertise to break into systems and steal information illegally while posing as a friend or dedicated employee/consultant. But presently, some of them are acting as “White Hat Hackers” who specialize in testing the security strength of their clients’ information systems.
  
If the interest of the aforementioned set of hackers (White Hat Hackers) is to be paid, they will attempt to hack into a company’s network and then present the affected company with a report detailing the existing security loopholes of the company and how those anomalies could be tackled. The advantage of this is that, they can use their skills for a good cause and help stop other cyber criminals, since keeping up with security and cyber criminals is a fulltime job and many companies can’t afford financially to have someone totally dedicated to it.

Another recent devastating aspect of internet hacking is the “Social Engineering” routine. Social engineering is a tactic used by cyber criminals that use lies and manipulations to trick people into revealing their personal information. Social engineering attacks frequently involve very convincing fake stories to lure victims into their trap. Some of these tricks include:

v Sending victims an email that claims there’s problem with their account and has a link to a fake website.

v  Trying to convince victims to open email attachments that contain malware, pretending to be a network/account administrator and asking for the victim’s password to perform maintenance activity.

v Claiming that the victim has won a prize but must give their credit card information in order to receive it.

v  Promising the victims that they will receive millions of dollars if only they will help out the sender by giving them money or disclosing their bank account details, just to mention but a few.

The recent dimensions of cyber crimes, which are becoming funny, barbaric and deadly, have called for constant and consistent update of advanced anti-hacking computer software by software producers, and the adequate dissemination of the said software to the apt quarters. Presently most developing countries are less-privileged in regard to advanced anti-hacking or anti-malware software.

On the other hand, a strict and grievous law regarding cyber crime ought to be implemented by all the countries in the world. Also, thoroughly equipped Internet Communication Agencies comprising well experienced experts are expected to be established by the respective countries.

The bill regarding Cyber Crime that is presently lying on the floor of the Nigeria’s National Assembly is a way forward and a right step in the right direction, but it should be passed into law in earnest. And when signed into law, ought to as a matter of urgency be implemented by the executive arm.     

Those involved in these criminal acts with the sole aim of bankrupting their victims should endeavour to turn a new leaf to exonerate themselves from the dangers that will surely befall them. 

Above all, the potential victims either individuals or corporate organizations, must also take precautions of the aforementioned internet or computer scams in order not to exclaim ‘Had I known’.

 

     COMR. FRED NWAOZOR

Public Affairs analyst & Social activist

________________________________

              +2348054719437

No comments:

Featured post

UZODINMA AND BUHARI’S ‘WORKING VISIT’ TO IMO

by Fred Nwaozor The last time I checked, Imo was conspicuously at it again, hence needs to be re-examined by all-concerned for the good ...

MyBlog

Language Translation

ARCHIVE