Skip to main content

An Overview of Cybercrime

Dan earned his CompTIA (CIOS) certification in 2010 and worked in the computer repair/networking industry for several years.


Although computer hacking extends further back in time, War Games (1983) and Hackers (1995) pricked the curiosity of the DIY-inclined. Enticed by the cult films, many ventured out to understand and tinker with computers — many of who succumbed to the glamour of computer-based fraud.

It has a relatively long history which should bring pause to those using computers for processing sensitive information. Online banking, data storage, and patient health care data are examples. Where the potential for computer-based crime exists there are usually recommendations for mitigating it.

What Is It?

Cybercrime generally refers to the unauthorized access of computers or networks with the end goal of disabling them or viewing private information. A computer hacker is a nomenclature for one who commits such a crime. Black market financial gain, bragging rights, and political opponent dirt are among the things sought. Those in lawless computer hacking circles especially love sharing accomplishments.

The internet is a common avenue by which hackers carry out attacks — although not the only way. The technicalities of how this is done vary depending on a hacker’s goal and the security posture of the system attacked. Some devices and networks are more secure than others. The relatively weak security of some systems is occasionally referred to by the hacker community as a “joke.”

Moving Forward

A cornerstone of successful cybercrime is complacency. Victimized computer users are typically comfortable in their routine for a long period — before getting hacked. Getting off the sidelines and becoming familiar with computer security helps. Books and various free internet tutorials are available for it.

Moreover, if computers are too burdensome to handle, hiring managed service providers can help with the load. In fact, the norm for many businesses is to outsource the management and security of their IT infrastructure. Consumers can do the same for handling their less-sophisticated devices.

Scroll to Continue

This content is accurate and true to the best of the author’s knowledge and is not meant to substitute for formal and individualized advice from a qualified professional.

© 2022 Dan Martino

Related Articles