Cybercrime: Users need to understand classifications

Opinion Aug, 10 2022
Cybercrime: Users need to understand classifications
  • 545
  • 0

Crime is a word used for wrong deed or offence, but when it comes to cybercrime then, it can be defined as a crime done by internet to cause an immeasurable loss to individual, organisation, or government. Cybercrime is a punishable offence committed by cyber criminals.

Rapid technological growth and developments have provided vast areas of new opportunity and efficient sources for organisations of all sizes. Technological growth is majorly backed by internet. Internet has brought distant objects closer, in other words, it makes world small. Internet has now become a national asset, whole national security is also depending on it. But these new technologies have also brought unprecedented threats with them.

Everybody thinks that only stealing someone’s private data is Cyber Crime. But in defining terms we can say that ‘Cyber Crime refers to use of an electronic device (computer, laptop, etc.) for stealing someone’s data or trying to harm them using a computer. Besides, it is an illegal activity that involves a series of issues ranging from theft to using your system or IP address as a tool for committing a crime.

Classification of Cyber Crimes:

* CRIME AGAINST AN INDIVIDUAL: This is form of cyberstalking, trafficking, and grooming. Over years, this type of cybercrime has been taken seriously by law enforcement agencies. It is now keeping a track over every such attack on an individual.

* CRIME AGAINST AN ORGANISATION: This is done against a firm, company or organisation to get unauthorised access to data. This is done either to reveal important data and employee details of company or for money-making.

* CRIME AGAINST GOVERNMENT: These types of crimes are denoted as cyber terrorism. This can be a terror because attacker can get hold of essential documents related to government projects. An enemy nation or terrorist usually makes such attacks. There are many cases globally where a terrorist hacks government data. Apart from these, there is a financial crime where hacker steals money of the user account holder. Moreover, they steal company data and finance.

Cybercrime is most discussed issue of 21st century. Technology sector worldwide is witnessing a boom in consumer of smartphones and internet which is raising concerns with regard to privacy and security of users. Owing to this reason, it is highly essential for all users to know about cybercrime and security.

There are many types of cyber-crimes and most common ones are explained below:

* HACKING: In this type, computer system of person is hacked to get personal information. In many countries, including India, hacking is a punishable act. It is quite different from ethical hacking. In normal hacking, illegal use different types of software to enter system of target person. Hacker is then able to monitor every activity done by person.

* PIRACY OR THEFT: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer-sharing websites that encourage software piracy and many of these websites are now being targeted by FBI. Today, judicial system is addressing this cybercrime and there are laws that prevent people from illegally downloading. Film producers and directors often become victims of this crime.

* CYBER STALKING: This is a kind of online harassment wherein victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use Internet to stalk. However, if they notice that cyberstalking is not having desired effect, they begin offline stalking along with cyberstalking to make victims’ lives more miserable.

* IDENTITY THEFT: This has become a major problem with people using Internet for cash transactions and banking services. In this cyber-crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in victim’s name. It can result in major financial losses for victim and even spoil victim’s credit history.

* COMPUTER VANDALISM: Computer vandalism is a type of malicious behavior that involves damaging computers and data in various ways and potentially disrupting businesses. Typical computer vandalism involves creation of malicious programs designed to perform harmful tasks such as erasing hard drive data or extracting login credentials. Computer vandalism differs from viruses, which attach themselves to existing programmes.

We could list following reasons for susceptibility of computers:

* RELAXED TO ACCESS- Problem behind protection of a computer system from unauthorised access is that there are many possibilities of breach due to complex technology. Hackers can steal access codes, retina images, advanced voice recorders, etc. that can fool biometric systems easily and bypass firewalls can be utilised to get past many security systems.

* VOLUME TO STORE DATA IN REASONABLY SMALL SPACE- Computer has unique characteristic of storing data in a very small space. This makes it a lot easier for people to steal data from any other storage and use it for their own profit.

* MULTIFACETED- Computers run on operating systems and these operating systems are programmed with millions of codes. Human mind is imperfect, so it can do mistakes at any stage. Cybercriminals take advantage of these gaps.

* CARELESSNESS- Negligence is one of characteristics of human conduct. So, there may be a possibility that protecting computer system we may make any negligence that provides cyber-criminal access and control over computer system.

* LOSS OF PROOF- Data related to crime can be easily destroyed. So, loss of evidence has become a very common and obvious problem that paralyses system behind investigation of cyber-crime.

 

Published in The Daily National Courier, August, 10 2022

Like Business on Facebook, follow @DailyNCourier on Twitter to stay informed and join in the conversation.

Syeda Hoor Shumail
Syeda Hoor Shumail https://www.dailynationalcourier.com/author/syeda-hoor-shumail
Contributing author at Daily National Courier. Looking after OP-ED page with diversified content on mix topics of greater interest. Also member of Karachi Union of Journalist (KUJ).

NC Big Stories

Registrar has failed to remove the illegal committee from Karimabad Society

KARACHI: Even after more than twelve weeks, the elections of Karimabad Ismailia Multi-Purpose Cooperative Society Limited are still delayed, leaving the society’s important administrative work in the hands of unelected individuals. The long-del...

All Karachi Urdu Declamation Contest- 2025 held at ICMA on Iqbal Day

KARACHI: Organized by the Youth of Pakistan Foundation, the All Karachi Declamation Contest was held at ICMA University on the occasion of Iqbal Day, in which young speakers from across the city presented the thoughts and message of Allama Iqbal in a...

SHC disposes of petition in Karimabad alleged illegal construction case

KARACHI: The Sindh High Court has disposed of a petition filed against alleged illegal constructions in the Karimabad Ismailia Multipurpose Cooperative Society. The court made it clear that construction can only be carried out according to the approv...

Karachi’s New Master Plan 2047 Faces Unseen Urban Hurdles

KARACHI: As Karachi’s planners speak of a vision for 2047 the city’s current state stands as a cautionary tale. Decades of unregulated construction ignored zoning laws and unchecked expansion have left Karachi suffocating under its own ur...

More like this
Related

Karachi’s New Master Plan 2047 Faces Unseen Urban Hurdles

KARACHI: As Karachi’s planners speak of a vision for 2047 the city’s current state stands as a cautionary tale. Decades of unregulated construction ignored zoning laws and unchecked expansion have left Karachi suffocating under its own ur...

Beyond Intelligence: A Tech Lead’s Frontline View of AI’s Advancement

Artificial Intelligence has advanced from lab curiosity to boardroom necessity. But as companies race to integrate AI into their operations the people quietly directing these transformations often remain unseen. Muhammad Faizan Khan, a seasoned Tech...

Human and Consciousness – An Unending Journey

A human being is not merely a body of flesh and bones; rather, he is a reflection of consciousness that evolves over time. As circumstances change, the inner eye of a person begins to awaken much like physical maturity emerges at a certain stage of l...

The Hypocrisy of Selective Awareness: When Silence Funds Bombs

In a world increasingly shaped by global activism, social media awareness, and political consciousness, there remains a disturbing contradiction that exposes the depth of our moral confusion: we are quick to question aid for the oppressed, yet we wil...
Need Help? Chat with us