You are on page 1of 2

computer crime generally referred to as cybercrime has increased vehemently in recent

times.. Cybercrime is simply the use of computer to indulge in illegal activities such as
fraud, stealing identities, and violating privacy. It is a global challenge that individuals,
both private and public organizations as well as governments face. According to(Das &
Nayak, 2013)" Research study has found that one in five online consumers in the US
have been victims of cybercrime in the last two years"(p. 144). Depending on what the
cybercriminal does with the computer, cybercrime can be grouped into different types.

Cyberterrorism. It occurs when an individual attacks a government or an organization in


order to destroy and or access some confidential information stored on the computer and
their networks. Cybercriminals also engage in cyber extortion whereby websites, e-mail
servers, and computer systems are attacked by hackers demanding some huge amount of
money in return. According to(Georgeva, 2022)"Diaro de Noticias, a local Portuguese
news organization , on September 8th reported theft the Portuguese Government
Department of Defense has been a subject of a cybersecurity data breach following
breach involving leakage of sensitive NATO documents that are published and sold on
the dark web"(para. 1).

Fraud-Identity theft. This occurs when a person impersonates to be another person so as


to receive vital information from someone. Fraudsters succeed in doing this by
sometimes creating fake pages to retrieve these vital information from people.According
to(Olusola et al., 2013)"In Nigeria, people design web links forms requesting users to fill
in their basic information including unique details like pin numbers and use that to
commit crimes"(p. 22). Recently in Ghana, dating and scamming online whereby a male
disguises himself as a female in the cyberspace has phenomenally increased in the Zongo
communities and rich men in foreign countries are always the victims.

Spam. This is occurs when cybercriminals indiscriminately send an unsolicited


information to people through electronic messaging systems. While the most widely
recognized form of spam is e-mail spam, the term is applied applied to similar abuses in
other media: instant messaging spam, mobile phone messaging spam, internet forum
spam, junk file transmissions, social online classified adds spam, mobile phone
messaging spam,etc(Olusola et al., 2013). According to(Das & Nayak, 2013)"Nearly 69
per cent of information theft is carried out by current and ex-employees and 31 per cent
by hackers"(p. 145).

Reference

Das, S., & Nayak, T. (2013). Impact of cybercrime: Issues and challenges. International
Journal of Engineering Sciences & Emerging Technologies, 6(2), 144-145

Eva, G. (2022, 09, 20). Sensitive NATO data leaked after cyber attack on Portugal's
Armed Forces. Purplesec. https://purplesec.us/security-insights/nato-data-leaked/
Olusola, M., Samson, O., Semiu, A., & Yinka, A. (2013). Cyber crimes and cyber laws in
Nigeria. The International Journal of Engineering and Science, 2(4), 21-22.

You might also like