Cybercrime: Do those words make you shiver, just a little? When we think of cybercrime, it’s not like other crimes that can seem distant and unlikely, like a robbery. Cybercrime seems to be something anyone can fall victim to, at any time. And it’s not just an individual who can be a victim. Cybercriminals can target businesses, nonprofits, or even entire governments and nations. 

Cybercrime is possibly more frightening because it happens behind the scenes and we don’t see it coming, we only know when it hits and we’re suffering from the fallout. In addition, it’s on the rise. We had 38 percent more cybersecurity events in 2017 than in the previous year, and we can expect that number to keep going up. Nor is anyone safe from it: individuals, small businesses, countries—anyone can be a target. 

But what exactly constitutes a “cybercrime,” given that different types of crimes fall into this category—as well as different types of victims? What drives these cybercriminals to do what they do? And most importantly, what can we do about it?

Types of Cybercrime

Cybercrime is a crime that in some way uses a computer to commit the crime or a computer is a target of the crime. The most common types of cybercrime are listed below but note that these can take more than one form. For example, identity theft is not listed below but phishing often leads to identity theft: 

  • Hacking: Hacking is when what happens when a cybercriminal gains unauthorized access to a computer or network. It’s not necessarily a crime, but can be the way in for someone to commit a crime. 
  • Viruses: A computer virus works like one that a human gets because it spreads when conditions are right. Once triggered, a virus spreads to other computers and can either alter or even delete data, in addition to changing how a computer works. 
  • Malware: Malware takes the form of a software program written to do harm by infecting a computer system. Malware can be a virus, Trojan horse, worm, spyware or adware.
  • Ransomware: Ransomware is a type of malware that involves holding data hostage until a ransom is paid. 
  • DDOS attacks: DDOS stands for Distributed Denial of Service. These attacks are used to render a computer network useless or to make it crash by bombarding it with traffic.
  • Phishing: Phishing is often done to individuals. Cybercriminals use emails and URLs to trick people so they unknowingly hand over their login information. 
  • Cyber blackmails or extortion: These types of emails are becoming more common now that we have bitcoin because the cybercriminals use these emails to extort payment when they blackmail someone via email. 

Note: Other types of criminal activity also happen online, such as selling illicit information, but we are focused here on those that can be prevented by cybersecurity. 

What drives Cybercriminals? 

Although the list of types of crimes above is relatively short, they take many forms. Obviously, we have quite a few types of cybercrime to contend with in our modern age. But who does this stuff, and why? 

Greed is definitely one of the main reasons. If hackers can access a database of personal information, like with the Equifax data breach, they can sell that personal information on the black market, and it is then used to send spam or commit identity theft. Cybercriminals can also make money by demanding a ransom for the data they have blocked, or the payment they demand in a blackmail email. 

On occasion, cybercriminals are driven by a desire to make a political or social statement. Hackers might take down a site or network to make a statement, or they might make hacked documents public, as with the Panama Papers. And sometimes they are driven only by ego and a need for status, or by a selfish desire to be entertained by the destruction they can cause. Identifying a typical cybercriminal is probably as hard to do as identifying a burglar—motivations and backgrounds can differ, and can’t always be understood. 

However, don’t assume the only threats are from strangers outside of a company’s virtual walls. Cybercrime can also be committed by someone from within an organization when a disgruntled or dishonest current or former employee commits the crime. 

Cybersecurity Needs Good Guys to Fight Back 

Regardless of the type of cybercrime or the motivating factor, cybersecurity is now big business as a result of the criminal activity and the money it costs companies. By the end of 2021, ransomware will cost companies $20 billion, and it’s estimated that the global cost of cybercrime will reach $6 trillion by 2021—yes, trillion. 

The increase in cybercrime has created a huge need for cybersecurity professionals to combat the problem. It’s predicted that we will need 6 million cyber security professionals by 2019, and we will have 3.5 million unfilled cybersecurity jobs by 2021. In fact, the number of cybersecurity jobs is growing three times faster than other tech jobs.

Without more people skilled in preventing and battling the cybercrime, organizations, and individuals will continue to be hapless victims, with permanent damage done in some cases, to reputations, to bank accounts, to trust. 

Is there a Job for you in Cyber Security? 

If you’re even a little interested in cybersecurity, consider looking into it. It’s not all reacting to or fighting off attacks, which might sound too stressful, but it’s about prevention too. Cybercriminals succeed as often as they do not because they are incredibly clever, but because people make mistakes: 90 percent of cyber attacks are made possible due to human error, and most data breaches happen because hackers use weak or stolen passwords.  

You should also consider a job in cybersecurity if you’re looking for a job that offers good pay from the very start. Even entry-level employees can earn $65,000 in their first job after earning a certification. From there, the pay only goes up: The median annual salary is $90,000 with higher salaries paid in tech hubs like Silicon Valley. 

As for getting started in the field, there are several types of certifications to choose from, ranging from the CompTIA certification for those new to the field, to Certified Ethical Hacker (CEH) certification and the CISSP certification (Certified Information Systems Security Professional) which is considered the gold standard in the field of information security. Once you’re working in the field, several types of jobs are possible.

Just like we won’t ever see an end to crime, we won’t see an end to cybercrime. But the difference is, cybercrime is on the rise, increasing at a frightening rate. The world needs people to put a stop to it. Will you be one of them? 

Our Cyber Security Certifications Duration And Fees

Cyber Security Certifications typically range from a few weeks to several months, with fees varying based on program and institution.

Program NameDurationFees
Post Graduate Program in Cyber Security

Cohort Starts: 20 Jun, 2024

6 Months$ 3,000
Cybersecurity for Technical Leaders Program

Cohort Starts: 13 Jul, 2024

3 Months$ 3,000
Caltech Cybersecurity Bootcamp

Cohort Starts: 15 Jul, 2024

6 Months$ 8,000
Cyber Security Expert6 Months$ 2,999

Learn from Industry Experts with free Masterclasses

  • Career Masterclass: Develop a Cybersecurity Red Team Career

    Cyber Security

    Career Masterclass: Develop a Cybersecurity Red Team Career

    23rd May, Tuesday9:00 PM IST
  • Cyber Analyst vs Ethical Hacker: Choosing the Right Career Path?

    Cyber Security

    Cyber Analyst vs Ethical Hacker: Choosing the Right Career Path?

    24th Apr, Wednesday7:00 PM IST
  • Steer Your Cyber Security Career Ahead in 2024 with Cyber Security Expert Master’s Program

    Cyber Security

    Steer Your Cyber Security Career Ahead in 2024 with Cyber Security Expert Master’s Program

    21st Mar, Thursday7:00 PM IST