In today’s globalised society, the rapid advancement of technology has brought about
multitudinous benefits and conveniences. However, along with these advancements, we have witnessed a significant rise in cybercrime. The digital landscape has become a breeding ground for malicious activities, posing serious threats to individuals, businesses, and even nations.
This article delves into the causes behind the surge in cybercrime, examines its far-reaching impacts, and explores the crucial responses necessary to combat this growing menace.
According to a world leading expert on cyberpsychology, Dr. Mary Aiken in the Journal of Cybersecurity, she defined cybercrime as “any criminal activity that is conducted or facilitated
through the use of digital technologies, networks, or computer systems.”1 Cybercrime is
the illegal usage of any communication device to commit or facilitate in committing any illegal
act.
This definition encompasses a wide range of illegal activities that take place in the digital realm, Identity theft is one of the most prevalent forms of cybercrime. It involves thieves using several techniques to get personal information, like a credit card number or Social Security number, and then using those credentials to open accounts or make purchases. But this doesn’t end here as there are long lists of different types of cybercrime and
cybercriminal which include;
Malware Attacks: Malware, short for malicious software, refers to various forms of malicious
programs designed to infiltrate computer systems. This includes viruses, worms, ransomware, and spyware. Malware can damage or control systems, steal data, or hold data hostage until a
ransom is paid.
Hacking: Hacking involves unauthorized access to computer systems or networks with the intent
to gain control, manipulate data, or disrupt operations. Hackers exploit vulnerabilities in
software, weak passwords, or poor security practices to gain unauthorized access.
Online Scams: Online scams involve fraudulent schemes aimed at deceiving individuals into
providing money or valuable information. Common examples include lottery scams, romance scams, or fake online marketplaces where individuals are tricked into making payments for products or services that do not exist.
Data Breaches: Data breaches occur when unauthorized individuals gain access to sensitive information stored by organizations, resulting in the exposure of personal data. This can lead to identity theft, financial fraud, or compromised privacy,
Cyberbullying: This refers to the use of digital technologies to harass, intimidate, or harm others. It can take various forms, including spreading rumors, sharing offensive content, or sending threatening messages, leading to emotional distress and psychological harm,
Phishing: Phishing is a type of cybercrime where attackers impersonate legitimate entities, such
as banks or companies, to deceive individuals into revealing sensitive information like passwords, credit card details, or Social Security numbers. This information is then used for identity theft or financial fraud,
Distributed Denial of Service (DDoS) Attacks: DDoS attacks involve overwhelming a target
system or network with a flood of traffic, rendering it inaccessible to legitimate users. This can disrupt services, cause financial losses, and impact the reputation of the targeted entity, e.t.c.
Cybercriminals employ sophisticated techniques and exploit weaknesses in computer
networks, software, and human behavior to carry out their illicit activities. Cybercrime is sadly one of the fastest-growing criminal activities in the world today. In fact, according to the report from PR Newswire, cybercrime has increased by a staggering 400% since the start of the COVID-19 pandemic.2
In other to forage solution to this dreaded epidermic, it is important to search out the cause and its concerting consequences.
According to an article published by UNext editorial team in 2022, “85% of the global industries experienced phishing and social engineering cyber attacks last year.”3 As time goes on, the number increases at an incredibly fast rate. The use of cutting-edge technologies and cyberdefenses has made online thieves more potent than ever. Among many
reasons for cybercrime are;
• Poverty: poverty is a major driver of cybercrime. The prevalence of inequality, deprivation, and servitude, has created and fueled the attraction in cybercrime. In a publication by Adesina, O. S. (2012). The author post that this shabby increase in cybercrime is not unconnected to the growing level of poverty and economic inequality especially in Africa.4 The Guardian Newspapers article published on August 3, 2022, “phishing and scams hitting
438 per cent and 174 per cent in Kenya and Nigeria, respectively,”5
• Get rich syndrome: The quest for quick wealth and luxury has make many youths get loop with
internet fraud. Financial gain is a significant driving force behind cybercrime. Cybercriminals
engage in activities such as hacking, phishing, or ransomware attacks to extort money from
individuals, organizations, or even governments.
• Advancements in Technology: The rapid advancement of technology provides cybercriminals with new opportunities to exploit vulnerabilities. As technology becomes more complex and interconnected, it also becomes more challenging to secure, leaving potential entry points for cyberattacks.
• Anonymity and Global Reach: The internet provides cybercriminals with a degree of anonymity, making it harder for law enforcement agencies to track them down. Additionally, the global reach of the internet enables cybercriminals to target victims across borders, making it challenging for legal systems to effectively combat cybercrime.
• Lack of Cybersecurity Awareness: Many individuals and organizations have limited knowledge and awareness of cybersecurity best practices. This lack of awareness makes them more susceptible to falling victim to cyber attacks, as they may not take adequate precautions to protect their digital assets.
Inadequate Security Measures: Weak or outdated security measures, such as poor password management, unpatched software, or insufficient network security, create opportunities for cybercriminals to exploit vulnerabilities and gain unauthorized access to systems.
• Insider Threats: Insider threats refer to individuals within an organization who misuse their access privileges to carry out cybercrimes. This can include employees, contractors, or even disgruntled individuals with knowledge of the organization’s systems and processes.
The Center for Strategic and International Studies (CSIS) estimated that 600 billion US Dollars is lost to cybercrime each year, an increase from a 2014 study that put global losses at about 445 billion US Dollars(6).
Several analysts have calculated that by the end of this year, the cost impact would have
reached $7 trillion US dollars, which is a significant amount when considering the scope and gravity of this worldwide threat. Even worse, a number of studies project that worldwide
cybercrime losses would rise by 15% year over year over the next five years, reaching 10.5
trillion US dollars annually by 2025.(7)
The World Economic Forum (WEF) issued a warning, stating that the potential socioeconomic losses from the COVID-19 pandemic would be surpassed by the cost of cybercrime to the world economy.8
The impact of cyber crime globally is no mean discourse; from all fora, cybercrime is the new
pandemic that has pose treat to our global civilization.
Cybercrime has far-reaching impacts that affect individuals, businesses, governments, and
society as a whole. Here are some key impacts and effects of cybercrime:
• Financial Losses: Cybercrime results in significant financial losses for individuals and
organizations. This includes direct financial theft, fraudulent transactions, and the costs
associated with restoring systems, investigating incidents, and implementing cybersecurity
measures.
• Data Breaches and Privacy Violations: Cyber Attacks often lead to data breaches, where
sensitive information such as personal data, financial records, or trade secrets are
compromised. This can result in identity theft, reputational damage, and violation of privacy
rights.
• Disruption of Services: Cyberattacks can disrupt essential services, such as banking,
healthcare, transportation, or communication systems. This not only impacts the organizations targeted but also affects individuals who rely on these services for their daily activities.
• Damage to Reputation and Trust: A cyber breach can lead to a loss of trust and reputation for businesses and organizations. Customers may lose confidence in a company’s ability to protect their data, resulting in decreased customer loyalty and potential financial repercussions.
• Intellectual Property Theft: Intellectual property theft through cybercrime can harm businesses
by compromising valuable proprietary information, research, or creative works. This can undermine competitiveness, innovation, and future growth.
• Personal and Psychological Impact: Individuals who fall victim to cybercrime may experience
emotional distress, anxiety, and loss of trust. Identity theft, cyberbullying, or online harassment can have severe psychological effects on victims.
• National Security Risks: Cybercrime poses a significant threat to national security, as cyber
attacks can target critical infrastructure, government systems, or military networks.
State-sponsored cyber espionage and sabotage can compromise sensitive information and
disrupt essential services.
• Economic Impact: The widespread occurrence of cybercrime has a negative impact on the
global economy. It leads to increased costs for businesses, loss of productivity, and decreased
consumer confidence, ultimately affecting economic growth and stability.
• Social Implications: Cybercrime can have broader social implications, including the erosion of online trust and collaboration. It may discourage individuals from participating in online activities, limit access to digital opportunities, and hinder the growth of digital economies.
• Understanding the impacts of cybercrime highlights the urgency of effective responses and preventive measures. It emphasizes the need for robust cybersecurity practices, legislation, international cooperation, and public awareness campaigns to mitigate the risks and create a safer digital environment for individuals and organizations.
To combat the rising tide of cybercrime, a multi-faceted approach is necessary. Governments,
private organizations, and individuals must collectively prioritize robust cybersecurity measures. Strengthening legislation, enhancing international cooperation, and investing in advanced technologies are just a few of the responses required to effectively tackle this complex problem.
Moreover, raising awareness among the general public about cyber threats and promoting a
culture of cybersecurity is paramount in safeguarding our digital future. Hence, the following measures become necessary;
FOR INDIVIDUALS
Use strong and unique passwords: Create complex passwords for your online accounts and avoid using the same password for multiple accounts. Consider using a password manager to help you generate and store your passwords securely.
• Enable two-factor authentication (2FA): Enable 2FA wherever possible, as it adds an extra layer of security by requiring a second form of verification, such as a code sent to your mobile device.
• Keep your software up to date: Regularly update your operating system, antivirus software, web
browsers, and other applications to ensure you have the latest security patches and protections.
• Be cautious with email and online communications: Avoid clicking on suspicious links or downloading attachments from unknown sources. Be wary of phishing emails or messages that try to trick you into revealing personal information.
• Use reputable security software: Install and maintain a reliable antivirus and anti-malware software on your devices. Keep it updated to detect and remove any potential threats.
• Secure your Wi-Fi network: Change the default password on your Wi-Fi router and use strong
encryption (e.g., WPA2 or WPA3). Also, disable remote management and regularly check for
firmware updates from the manufacturer.
• Regularly back up your data: Create backups of your important files and data on a regular basis.
This will help you recover your information in case of a cyber attack or data loss.
• Educate yourself and stay informed: Stay up to date with the latest cybersecurity threats and
best practices. Be cautious about sharing personal information online and be aware of common scams and social engineering techniques.
FOR BUSINESSES AND COMPANIES
In United States v. Albert Gonzalez: This case involved the largest known credit card data
breach at the time. Albert Gonzalez, along with other hackers, stole millions of credit card
numbers from major retailers. He was convicted and sentenced to 20 years in prison. One could
only imagine the magnitude of loss this had impacted from the company.
• Implement robust cybersecurity policies: Develop and enforce comprehensive cybersecurity policies and procedures that outline best practices for employees to follow. This includes guidelines for password management, data handling, software updates, and safe online behavior.
• Conduct regular employee training: Provide cybersecurity training programs for all employees to raise awareness about common threats and educate them on how to identify and respond to
• potential risks. Training should cover topics such as phishing, social engineering, and safe
browsing habits.
• Secure network infrastructure: Utilize firewalls, intrusion detection and prevention systems, and
virtual private networks (VPNs) to secure your network infrastructure. Regularly monitor network traffic and scan for potential vulnerabilities.
• Encrypt sensitive data: Utilize encryption to protect sensitive data both in transit and at rest. This includes encrypting data stored on servers, databases, and portable devices, as well as encrypting data transmitted between systems.
• Conduct regular security audits and assessments: Perform periodic security audits and assessments to identify vulnerabilities, gaps in security controls, and areas for improvement. This can include penetration testing, vulnerability scanning, and risk assessments.
• Maintain backups and disaster recovery plans: Regularly back up critical data and have a
disaster recovery plan in place to ensure business continuity in case of a cyberattack or data breach.
• Test backups and recovery procedures periodically to ensure they are effective.
• Establish partnerships with cybersecurity experts: Consider engaging with cybersecurity experts, consultants, or managed security service providers (MSSPs) to assist in implementing and maintaining robust security measures. They can provide expertise and resources to
enhance your cybersecurity posture.
FOR GOVERNMENT
Enact comprehensive cybersecurity laws and regulations: Governments should establish and
enforce stricter laws and regulations that address cybercrime, data protection, and privacy.
These laws should define cybercrime offenses, specify penalties, and provide legal frameworks for investigation and prosecution of cyber criminals. For instance, the CyberCrime (protection and prevention) Act, 2015 which is the extant law on cyber crime in Nigeria lacks the proper toughness and thoroughness in combating cyber crime.
• Foster public-private partnerships: Governments should collaborate with the private sector, academia, and cybersecurity experts to share information, intelligence, and best practices. Public-private partnerships can enhance threat detection and response capabilities, as well as facilitate knowledge sharing and capacity building.
• Invest in cybersecurity infrastructure and capabilities: Governments should allocate resources to build robust cybersecurity infrastructure, including secure networks, incident response capabilities, and cyber threat intelligence centers. By investing in advanced technologies and skilled cybersecurity personnel, governments can strengthen their ability to detect, prevent, and respond to cyber threats.
• Promote cybersecurity awareness and education: Governments should prioritize cybersecurity awareness campaigns and educational initiatives to educate citizens, businesses, and public officials about cyber risks and best practices. This includes promoting safe online behavior,
recognizing phishing attempts, and understanding the importance of strong passwords and regular software updates.
• Strengthen international cooperation: Cybercrime knows no boundaries, so governments should actively engage in international cooperation to combat cyber threats. This includes sharing information, collaborating on investigations, and promoting the development of international norms and agreements in cyberspace.
• Support law enforcement agencies: Governments should provide adequate resources and training to law enforcement agencies to investigate and prosecute cybercriminals effectively. This includes specialized training programs, forensic capabilities, and international cooperation frameworks.
Conclusion: As we delve deeper into the causes, impacts, and responses to cybercrime, it becomes evident that this issue demands a concerted effort from all stakeholders. By
understanding the underlying factors, acknowledging the far-reaching consequences, and implementing proactive measures, we can confront the rise of cybercrime head-on and build a safer digital landscape for generations to come.
Mohammed Aishat JoyI is a third year law student at the University of Jos, having a deep interest in cybersecurity and its legal implications.
1Aiken, M. P. (2022). Conceptualizing Cybercrime: Definitions, Typologies and Taxonomies. Forensic Sciences. 2 (2), pp. 379-398.
International Journal of Humanities and Social Science
Research Journal of Engineering and Technology
2 NEW YORK, Aug. 11, 2020 /PRNewswire/ –
3https://u-next.com/blogs/data-science/importance-of-data-science/
4 In a publication by Adesina, O. S. (2012). The negative impact of globalization on Nigeria. International Journal of Humanities and Social Science, 2(15), 193-201
5 Adeyemi Adeptun (2022) ‘Cybercrime rises as pishing hits 174% in Nigeria, 438% in Kenya’, The Guardian, 3rd of August. Accessed ( 25th of October, 2023)
Economic Impact of Cybercrime – No Slowing Down
6 James Andrew Lewis, (2018), ‘Economic Impact of Cybercrime – No Slowing Down, a global report that focuses on the significant impact that cybercrime has on economies worldwide’, The Center for Strategic and International Studies (CSIS), 21st February, accessed 24th October, 2023.
7 Aamir M, Rizvi SSH, Hashmani MA, Zubair M, Ahmad J. Machine learning classification of port scanning and DDoS attacks: A comparative analysis. Mehran University Research Journal of Engineering and Technology. 2021;40(1):215–229. doi: 10.22581/muet1982.2101.19.
8 The Global Risks Report 2022, 17th Edition, is published by the World Economic Forum.
9 States v. Albert Gonzalez (2009), United States District Court for the District of Massachusetts, No. 08-CR-10223 (D. Mass. 2009)
Journal of Cybersecurity