Essays /

Cybercrime The Challenge To Internet Banking Essay

Essay preview


Introduction
Cyber-crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web. There isn’t really a fixed definition for cyber-crime. The Nigerian Harmonized Cyber Security Bill of 2011 explains Cyber Crime as all crime emarginated offline which can be achieved with the use of computer networks as a tool, threats to lives and properties, disruption of critical services, terrorism and economic sabotage, propaganda and theft of information.

This paper talks about the types of cyber-crimes: hacking, data theft, spreading virus and worms, identity theft, yahoo attack and cyber terrorism; causes and effects of cyber – crime on banking, transaction and reputation; finally it will also look at the measures in place to help reduce cyber- crime activities.

Types of cyber crime
Various types of cybercrimes have been discussed in the literature and have also been experienced by bankers and other financial institutions. Notable worldwide cybercrimes common in developing countries including Nigeria and Ghana are hacking, data theft, spreading virus or worms, fraud or identity theft, yahoo attack, and cyber terrorism.

Hacking
Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources. The term hacker” originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications. Unauthorized disclosure of access code, people’s system interference, misuse of device, denial of service and records retention are acts criminalized under the Harmonized Cyber Security Bill 2011 of Nigeria. Offenders are punishable by law which may extend to prison terms or with fine. Hacking offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate. Unfortunately, unlike Nigeria, there is no law in the statute books in Ghana that address these types of crime. The Police still rely on conventional crime laws on false pretence in the criminal Code Act 29/60 Section 131 and its associate statutes. Crimes committed under these laws are bailable offences and carry lesser punishments which cannot therefore deter the fraudsters from committing cyber offences.

Data theft
Data Theft is a rising problem, primarily perpetrated by office workers with access to technology such as desktop computers and handheld devices, capable of storing digital information such as flash drives, iPods and even digital cameras. The damage caused by data theft can be considerable with today’s ability to transmit very large files via e-mail, web pages, USB devices, DVD storage and other hand-held devices.

The sections 2 – 18 of the Harmonized Cyber security Bill 2011 of Nigeria criminalize the act of data theft and data forgery. Also the Information Technology (Amendment) Act, 2008, crime of data theft under Section 43 (b) is stated as - If any person without permission of the owner or any other person, who is in charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft. Law & Punishment: Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable. Data theft offence is also cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.

Spreading virus or worms
Worms and viruses can do any amount of harm; the creator anticipates them to do. They can send your data to a third party and then delete your data from your computer. They can also ruin and mess up your system and render it unusable without a re-installation of the operating system. Most have not done this much damage in the past, but could easily do this in the future. Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system. It will then attempt to replicate itself by sending itself to other potential victims.

Under the Harmonized Cyber Security Bill 2011of Nigeria Section 2 – 18, it makes it unlawful for a person to have unlawful access to another person’s computer and system interference . Also under Information Technology (Amendment) Act of India, 2008, Section 43(c) & 43(e) with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable. Spreading of virus offence is equally, like data theft, cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.

Fraud - identity theft
Fraud is a criminal activity in which someone pretends to be somebody and retrieve vital information about someone. For instance, making a false bank webpage to retrieve information of account of someone constitute an identity theft. This is known as sakawa in Ghana (Boateng et al., 2011). The concept is simple; someone gains access to your personal information and uses it for his own benefit. This could range from a black-hat hacker stealing online banking account login and password to getting access to ATM and using such people can make themselves a lot of money with personal information. In Nigeria people design web links forms requesting users to fill in their basic information including, unique details like pin numbers and use that to commit crimes (Hassan, 2011).

The Nigeria Harmonizes Cyber Security Bill of 2011 Section 2 – 18 criminalizes computer – related offenders which include identity theft and unlawful access to a personal’s computer. According to the Information Technology (Amendment) Act of India of 2008, crime of identity theft und...

Read more

Keywords

-05 -100 -631 /archive/vol2no7/vol2no7_11.pdf /commerce/jibc/ /download/cybercrimecost.pdf /fragile /journals/jiacs/2012/322399/322399.pdf /v11/jiti.v11n2.085-100.pdf 000 06 1 11 11.6 13 131 15 17 18 1860 1983 1997 2 20/02/2014 2000.the 2003 2006 2008 2010 2011 2011of 2012 2013 268 29/60 3 32 379 4 405 41 419 41st 420 43 45 5 50 500 626 66 7 700 745 85 abc abc-clio abil abl abridg abus access accord account account-centr achiev acknowledg acquir across act activ actual adapt add addit address adekund advanc advantag advent affect africa african agenc aggress agwu al alli alon along alreadi also alter although amend among amongst amount analysi analyt annual anoth anti anti-poverti anticip anywher apart appear appli applic apposit approach appropri area arm around arpn aspect assembl assess associ atm attack attempt authent author autom automat avoid awar ayind b bailabl balanc bank banker barbac base basi basic becom behind believ benefici beneficiari benefit best better beyond bhatta big bill billion black black-hat blameless block boateng bodi book boy bradshaw breach break brenner britton broad broader brought budu build built busi buy by-the-hour bypass c ca cabinet calcul call camera campaign cannot capabl capit card carri case cash cashing-out casualti caus caution center centric challeng chanc chang channel chao character charg charl check children cite citi clean clear click clio code cogniz collabor collect combat come commerc commerci commiss commit common communic communiti compani compar competit competitor complaint compliant compound compris compromis comput computer concept conclus condit confid confidenti confront connect consecut conserv consid consider consist constitut consum contain context control convent coordin copi corp corpor correl correspond cost could counsult counter countri court cover coverag creat creator credenti credit crime crimin crippl critic cross cross-channel culprit curb current custom cyber cyber-crim cybercrim cyberspac d damag data ddos deal decid declar defam defens defin definit delet deliber demand denial depart describ descript design desktop detail detect deter determin deterr develop devic devis differ difficult digit direct disclosur disconnect discret discuss dishonest dispar disrupt distort distribut divers dollar domin done doubt download drive drop dua due dupe dvd e e-commerc e-mail earn easier easili ecommerc econom economi edg educ effect effort electron eli elit els email emargin embark emphas employ enabl enforc engin enhanc enorm ensur enter enterpris entrust environ epidem equal equip especi establish esteem estim et even event ever everi exampl except exchang exist expens experi experienc explain extend extort extortionist extract extractor eye f facilit factor failur fall fals favor fear featur feder fee fight file fill final financi find fine firm first first-ev five fix flash focus follow forens forgeri form format fraud fraud-as-a-servic fraudster fraudul free ftc fundament furthermor futur g gab gain gap general generic geometr get ghana ghanaian gift global globe good goodwil govern gradual great groom group grow growth habor hack hacker hand hand-held handheld handl hardwar harm harmon harsh harvest hassan hat head health heavi held help high hing home horizont host hostil hour howev huge ident identif identifi ignor imag immedi impact imperson implement implic imposs imprint improv inadequ incid includ increas inculc incur india indian indirect individu industri infect influx inform infrastructur initi innoc insidi instal instanc institut insur integr intellectu intellig intend intent interact interest interfer intermitt intern internet introduct invest investig investor involv ipod isabalija isn isp issu itrc j javelin job join journal justic justin k keep key kharouni kingdom know known l lag laid larg lass launch laura law layer lead leadership led left legisl lend less lesser let letter level lexi like line link list literatur live locat login look lose loss lot lucrat m machin machine-to-machin made magistr magnifi mail main mainten major make makind malwar mani margin mass massiv materi matur maximum may mean meant measur mechan medium meke mess mike millennium million minim misus mitig mobil money monitor month move movement much mule multipl must n.d name narrat nation natur need negat network never new nexi next nigeria nigerian notabl notwithstand number numer o object obliqu observ obtain occur off offenc offend offer offic offici offlin ogunher olasanmi olumid olusola oluwafemi omit one onlin open oper opportun order organ organis origin oscil outflow outsid overal overcom overhead overview owe owner p pace packag page paper paramet paramount parker part parti particular pass password past pattern payment peculiar penal penalti pend peopl percent percentag perform perman permiss perpetr person personnel phenomenon phish phone physic pin place plan plot point polic polici policyhold poor popul populac popular portfolio pose possibl potenti poverti power prabhu practic predomin preoccupi prepar pretenc pretend preval prevent prey price primarili prison privat proactiv problem proceed process proclaim produc product profit program programm promot prompt propaganda propens proper properti proport prosecut prospect protect provid provis public punish purpos pursu put qualit quantit quarter quest quick quickest r rais rang rank ransom rapid rate rather re re-instal reach read real realiz realli recent recipi recogn reconnaiss record recov recoveri reduc refer reflect regard regim regul regular relat relev reli remind remov render rent replic report reput request requir research resolv resourc respond respons restor result retent retriev return reveal rich rigor ring rise risk robber robust rogu ruin rule run rural s.w sabotag safe sakawa santa save scale scam scienc scope scriber search sec section sector secur see seek seem seen self self-proclaim sell send sensit seromi serv server servic sesan settlement share sharehold show signatur signific simpl simpli sinc singl site situat slow social softwar solut somebodi someon sometim son sophist sourc space speak special specialist specif spend spent spider spread standard start state statist statut steal step still stock stolen stop storag store strateg strategi strength strive strong studi subsequ success suffer suit survey surviv system tactic take takeaway taken talk tap target tata techniqu technolog teller term terror terrorist theft theori therebi therefor third though threat threaten thrive throughout time today tool top total touch track trade trade-off transact transmit trauma travel treat trend tri triabl trigger trust turn type typic ubiquit uk unauthor underpin understand underway unemploy unexpect unfortun uniqu unit unknown unlaw unlik unus upon urban us usag usb use user usual v valuat variat various ve vertic via victim vigil virtual virus visibl vital warn wastag way weak web webpag websit well whoever whose wide within without word work worker worldwid worm would www.arraydev.com www.arraydev.com/commerce/jibc/ www.ejournalofscience.org www.ejournalofscience.org/archive/vol2no7/vol2no7_11.pdf www.ibimapublishing.com www.ibimapublishing.com/journals/jiacs/2012/322399/322399.pdf www.jiti.com www.jiti.com/v11/jiti.v11n2.085-100.pdf www.pinigeria.org www.pinigeria.org/download/cybercrimecost.pdf www.rprconline.org y yahoo year young