Cyber crime refers to those illegal activities that are done with the use of a computer. To be cyber safe we first need to find the Causes Of Cyber Crime. Cyber criminals always opt for an easy way to make big money. They target rich people or rich organizations like banks, casinos and financial firms where a huge amount of money flows daily and hack sensitive information. Catching such criminals is difficult. Hence, that increases the number of cyber-crimes across the globe. Computers are vulnerable, so laws are required to protect and safeguard them against cyber criminals. We could list the following reasons for the vulnerability of computers:
1. Easy access to systems:
Cyber crimes have been on the increase because there is no security form that skilled cyber criminals cannot bypass.
2. Easy destroy of evidence:
Cyber criminals are very intellectual. This means that they can hack their way into a system, steal the required information and erase any evidence of their involvement easily.
3. A modernized world:
Amidst many other causes of cyber crime is the invention of computers which has been both advantageous and disadvantageous. Cyber criminals always find a way to use technology to commit cyber crimes against itself. More complex systems are difficult to hack, but not impossible.
4. Mobile devices:
Quite a number of cyber crimes have been reported as a result of mobile phones. the rate of cyber crime has been on the increase. Companies and organizations have reported breaches that have been enabled by mobile phones of their employees and other staff with the specific security clearances.
5. Weak passwords:
It is very easy for cyber criminals to hack their ways into poorly secured Wi-Fi spots, to steal passwords and in turn information. Weak passwords mean a quick and tireless access to the system.
The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.
Article By – Harshita Jain
Editing By – Jasleen Kaur