Mike's Book Gallery

Stay Connected Youths play important role in every country Social challenge Computer, major player Metallurgy Nigerian Youth Challenges Drug Abuse Crime

Monday 9 September 2019

Cyber Threats and Solutions on How to reduce Them

Never invest in any scheme that is based on a metaphor, or anything with the word, “next”, in it (e.g., “this kid is the next Elvis Presley”, “this will be the Lake Lucerne of the Southwest”). You will lose your shirt.
Clifford Cohen

Disadvantages of Internet Use

Design by Uzochukwu Mike P
Introduction
Many things are going on throughout the world with the help of internet connections or networks. There are many goodies that are attributed to the internet: people earn their money per day; able to make good research; able to earn money as prize, example through essay competitions; people make good friends; able to market their products and many others. But are there only good things about the internet?

Cyberspace is the notional environment in which communication over computer networks occurs. The communications through the computers can be wired or wireless. With wireless routers or satellites part of almost every computer network, cyberspace and the EM spectrum now form one continuous environment. A person can be in his toilet and communicate with one in another part of the world with this new technological development. In fact, with cyberspace the world is made whole. People feel like a million dollars (wonderful) with the help offered by this development.

Notwithstanding the good credits that are attributed to cyberspace, there are many challenges that the universe confronts from it. Yes… we obtain helps from internet but at the same time, so many threats are experienced from it. People are no longer safe browsing the net. More than 232.4 million identities were exposed and subject to potential theft during 2011. Hacking incidents posed the greatest threat, exposing 187 million identities.

The threats on the cyberspace can be combated with time. What is necessary is to apply the ideas yet to be detailed out. These ideas can go to extent in saving those who make use of internet on their daily living. None of these suggestions should be taken as a cock and bull story if we want to make internet a safe environment for all.
Internet fraud. Design by Uzochukwu Mike
The Cyber Threat
Cyber threat is the way through which internet users are threatened or the act of breaking the security of the internet users. In the world of today, many have met their waterloo because of the danger posed by the threat. Many would have made it in life, but are unable because of this challenge. Let me not go further, many would have been brightened up through writing articles online and make money, but they are afraid that it may be an avenue for stealing their identities. They fail to write because of the fear.

For one to fill any form online, the person must know the amount of momentum he gathers. This is because the internet protocol and the Mac addresses of the applicant may be stolen. Some business owners run adverts online and their usual statement is "click and claim your prize''. The argument here is: how genuine is it? It may be original and at the same time may be a fake one. Who knows if that is an access to know who you are and empty everything you have in your pocket.

Many Faces of Cyber Threats

On April 2013, I received a message from an email. The content said that my winning ticket number worn the sum of €1.5 million. The information said that my code hit a jackpot in the ongoing British Lottery. I was told to send my bank details to claim my cash. At the end, they told me to send a VAT fee of about €310. That was when I knew they were internet scammers.
Some of those that commit cyber crimes are young that they do not know the nature of the music they will face when caught. Like the case of young boy of 15 years who was trying to shut down yahoo, E*Trade, global crossing, CNN and eBay in Canada. He said at the time when he was caught that he did not understand the consequences of his actions.

The cyber spies and terrorists make use of shielded proxy server to hide their internet protocol addresses (IP). Whenever they make use of this, there is difficulty in finding who they are. They can hide their identities and sent signals throughout the whole world, deceiving people and scamming them at the same time. They can pretend to be Ghana while their root is in China.
Many are duped through the internet today. The crime partakers conform to be company owners while they do not own any thing. From online they demand for cash from the ‘yet to be preyed’ individual. The ‘prey’ in many occasions has fallen victim.

The online terrorists ‘attach' something on themselves before they betray their victims. You may ask what I meant. Some of them are very fetish which makes the victims to summit to their wishes. They use their magical power to get all they need through the internet. These practices are found mainly in rural and traditional areas.

Some states and non-states of the world sponsor cyber hacking. There is serious alarming bell ringing from this side because those who are to fight hacking are now the hackers. Seoul believes North Korea runs an internet warfare unit aimed at hacking U.S and South Korea government and military networks to gather information and disrupt service. The question now is "why are the countries fighting each other? The possible answer is for power.

So many computers and valuable machines have been destroyed because of the rapid growth in the hacking ‘businesses’. Computer networks at major South Korean banks and top TV broadcasters crashed en masse Wednesday, paralyzing bank machines across the country and prompting speculation of a cyber attack by North Korea. I called it business because many are paid for hacking into other people’s systems.

The Way Forward: Possible Ideas/Solutions on how to Arrest or Limit Cyber Threats

Investigations have shown that the challenges being faced by the cyber world have some internal employees as among the causes.The challenges posed by the internet threat have and is still pissing the masses off. Some telecommunication and other companies whose network services are tampered with should look into their worker. At times the workers are like spies to the company. They leak the security keys to the internet hackers.
Do not fall victim of internet fraudsters. A design by Uzochukwu Mike
Thorough investigation should be carried out on any who wants to be the big wheel of any company that makes use of computer in storing their valuable data. This is to be sure that the fellow will not let the
cat out of the bag. When some of them finally become the managers of one company or the other, they do not protect the internet security keys that lead to the stored data of the companies. There should be proper evaluations on the managers of all companies based on how trustworthy they are.

People must be taught the danger of fetish practices as this can doom the image of the world. Teaching against fetish practices should be carried out in different rural areas. Archaic practices that display fetish involvement should be destroyed. Seminars should be organized where people will be taught on the danger of fetish practices and how it affects the society negatively.
Those that scam others through internet corporation email providers like yahoo mail, Hotmail and Gmail can be traced. Whenever any scam is received from any email account owner that has 'yahoo', 'Gmail', Hotmail or any related attached to it, the internet corporate company should be hold responsible to provide the source. With the scammers information which the corporate companies have on their data base, these scammers can be traced and fished out.

The government and anti-scam agencies should help fight this. Stronger anti-scam agencies should be created. The government must give the maximum support to have positive results at the end of the fight. These agencies should work in every part of the world and there is to be subdivisions of these agencies in each nation.

Nations should stop being enemies of progress to others. They should stop hacking other countries information. Countries who think that they are superior to the other and therefore can hack into other countries information should lay low. They should not be too proud. Any nation that hacks into others information should be seriously handled with huge fine.

I noticed that some countries are still not worried on fighting cybercrime. More organizations that resist the threat of cyber criminals must be created like those organized by council of Europe. The Council of Europe helps countries to ratify, accede and implement these treaties through technical cooperation projects. There will be more eradication of these crimes if other nations adopt the culture of the council of Europe on fighting these threats.

Computers that do not hide the identities of the hackers and their likes are to be manufactured. This will enable easy access to the cyber criminals. With their Mac and IP addresses displayed, they can easily be located by the cyber crime fighters.

Severe punishments should be given to the cyber offenders when caught. They are to be tortured to provide their co-workers. This will be a lesson to other partakers. With the punishment displayed publicly even through television channels, others will repent and stop anything relating to cyber threat. There should be no compromise in the punishment as some of the offenders may be related to top government officials.

Some students have accusing finger pointing at them. Many of them are into hacking due to lack of basic academic needs and ignorance. These students learn these illegal activities from bad citizens. Majority of the students at the hacking schools are young Nigerians who want to improve on their computer knowledge and make ends meet with the knowledge gained, whether ethical, legal or not.

Scholarships and proper attentions are to be rendered to them. Agencies should be sent in many institutions to advise them on the danger of hacking into computer networks. There should be creation of secret anti cyber crime members who are to be students of the universities or schools. Nobody should know that such exists. Their functions will be to report student scammers or hackers to the main anti internet criminals’ organizations in the country.

The youth get involved in hacking because of unemployment. Good jobs and youth empowerment should be carried out to stop this crisis of internet crime. Over 67 million Nigerian youths are unemployed and the scenario opens the country to a major crisis if not quickly addressed. According to National Population Commission (NPC), in 2006, Nigerian youths are about 80 million. When 67 million are unemployed, how many are now employ?
More powerful and stronger anti-malware should be produced. Governments and private companies should sponsor this discovery. People may be surprise that viruses and their related types are threats to the internet. They are very big threat because they have destroyed many valuable documents in the society of today.

The internet hoodlums should be called for dialogue. With this mean, their problems will be known and settled at the same time. The truth is that these scammers are intelligent but they apply them in a negative way. These intelligent of theirs can be converted to something which is helpful to the society when addressed based on dialogue.
Those who just started browsing the internet should be tutored on the internet scammers so that they will not fall victims. When a hacker demands for money from email account holder in order to receive bigger reward and the later refuses, I believe that when he does not get 'customers', he will be compelled to change. These teaching can be conducted just for two minutes whenever any who wants to start using the internet goes to buy computer. Also, a simples tutorial can be inculcated in inter browsers in such a way that the user will be taught about scammers the first time he wants to use the internet with a minute.

Some hackers steal the identity of bank account owners and go to banks and withdraw money using fake cheques. The owner of any account must be called whenever he is not the one that comes to withdraw. From there, the cyber criminal will be held captive. This is to avoid stories that touch the heart. The EFCC confirmed that in the past three weeks, it has received increasing complains from bank customers of possible breach of their account by the bank workers. EFCC stands for the

Economic and Financial Crime Commission of Nigeria.
Some publish fake information online; they extort money from people. The solution is that those websites that publicize this kind of information should be hold to provide their source. Some good amount of money was extorted from university students when I was in my year two in the name of scholarships.

The Modern Day Fraudsters

Internet and young fraudsters all over the world are developing new strategies every day. In the recent time, these are mainly youths that are always active online. People fall victims to them because they lack knowledge on how they operate online. Many of these scammers have really made money through their scam.

Some pretend to be selling one or two services online. But the truth is that they sell nothing at all. They just want to dupe some amount of money from novice. Some of them pretend to be investors but are just cyber criminals. A cyber criminal can be in Nigeria and be using United States of America phone number. So that such fellow spoke to you with US phone number is not a guarantee. Read more of their tricks though Uzochukwu Mike's book.

Conclusion

Cyber criminals have made so many regret of their existence in this universe. Many samples of cyber threats have been detailed out. Combating cyber threat is not a day job, but, we can do it. All and Sundry must partake-both the government and the individuals. If the possible ideas are put into practice, we will reduce cyber threats. Try and shun cyber treat the way you can.

References

Economic and Financial Crime Commission of Nigeria;
Action against Economic Crime (Cybercrime) written by the Council of Europe;
Business Week news on the topic ‘South Korea: Chinese Address Source of Attack;
Cyberdefence, Key Trends and Statistics by North Atlantic Treaty Organization.

No comments:

Post a Comment