Cybercrime is a constantly evolving arena, as hacking techniques get more creative. In today’s world computers hold more valuable data than our homes. Cybercriminals are creating new kind of attacks to fit the new trends in technology.

Here are the cybercrime areas to consider when trying securing data:

Cybercrime areas to consider

  • System Susceptibility: This mask the potential and value of the target from hackers and also covers its vulnerabilities.
  • Threat accessibility: This includes if the systems and the data stored are physically accessible or not. It checks the defense systems used.
  • Threat capability: This identifies as the area that is out of the person’s control. It researches the kind of techniques and tools that can be used to hack the system and its data.

Cybercrime, initially starting in the 1970s, has come a long way since then. Hikvision, the world’s leading video surveillance products supplier. They have also provided cybersecurity tips to address and minimize security concerns.

Cybercrime in the 1970s

Cybercrime in the 1970s first started through the network of telephone. The attack was called phreaking, where the attacker could re-engineer the hardware. This was mostly practiced to make long-distance calls and reduce telephone rates.

In the 1980s

The current type of cybercrime relating to digital technologies first started in 1988 when the Morris Worm was introduced. It was the first distributed denial of service (DDoS) attack.

The first ransomware attack was launched in 1989. The malicious software would access the files and lock them until a small ransom is paid in exchange for it.

In the 1990s

At the turn of the century, the newly launched new browsers and email gave way for various phishing scams. The people were tricked to willingly provide their private information. The phishing spread through downloadable email and links like the ILOVEYOU worm. These infected and webpages seemed legitimate which fooled thousands of users.

In the 2000s

The 2000s started with a rise in social media which resulted in identity thefts. Criminals could forge their own accounts of people and access sensitive information pretending to be them.

Recent trends in cybercrime

Cryptojacking is the newest method of cybercrime as it takes less effort and fewer sentences if caught. The attacker joins a JavaScript code to a website that controls the processors of the computer. The infected computers are then used to mine cryptocurrency. It is estimated that 5% of cryptocurrency in circulation is through illegal mining.

Conclusion

The cybercrime statistics have drastically increased since the 1970s. The cybercrimes in the past were not too extreme as it is now. Thus, with computers and technology becoming the most trusted places, their security must be a priority.