ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Cyber Threats and Solutions on How to Reduce Them

Updated on June 27, 2015

Disadvantages of Internet Use

The analysis on Cyber crime and possible solutions to the problem.
The analysis on Cyber crime and possible solutions to the problem. | Source


Many things are going on throughout the world with the help of internet connections or networks. There are many goodies that are attributed to the internet: people earn their money per day; able to make good research; able to earn money as prize, example through essay competitions; people make good friends; able to market their products and many others. But are there only good things about the internet?

Cyberspace is the notional environment in which communication over computer networks occurs. The communications through the computers can be wired or wireless. With wireless routers or satellites part of almost every computer network, cyberspace and the EM spectrum now form one continuous environment. A person can be in his toilet and communicate with one in another part of the world with this new technological development. In fact, with cyberspace the world is made whole. People feel like a million dollars (wonderful) with the help offered by this development.

Notwithstanding the good credits that are attributed to cyberspace, there are many challenges that the universe confronts from it. Yes… we obtain helps from internet but at the same time, so many threats are experienced from it. People are no longer safe browsing the net. More than 232.4 million identities were exposed and subject to potential theft during 2011. Hacking incidents posed the greatest threat, exposing 187 million identities.

The threats on the cyberspace can be combated with time. What is necessary is to apply the ideas yet to be detailed out. These ideas can go to extent in saving those who make use of internet on their daily living. None of these suggestions should be taken as a cock and bull story if we want to make internet a safe environment for all.

The Cyber Threats

Cyber threat is the way through which internet users are threatened or the act of breaking the security of the internet users. In the world of today, many have met their waterloo because of the danger posed by the threat. Many would have made it in life, but are unable because of this challenge. Let me not go further, many would have been brightened up through writing articles online and make money, but they are afraid that it may be an avenue for stealing their identities. They fail to write because of the fear.

For one to fill any form online, the person must know the amount of momentum he gathers. This is because the internet protocol and the Mac addresses of the applicant may be stolen. Some business owners run adverts online and their usual statement is "click and claim your prize''. The argument here is: how genuine is it? It may be original and at the same time may be a fake one. Who knows if that is an access to know who you are and empty everything you have in your pocket.

Many Faces of Cyber Threats

On April 2013, I received a message from an email. The content said that my winning ticket number worn the sum of €1.5 million. The information said that my code hit a jackpot in the ongoing British Lottery. I was told to send my bank details to claim my cash. At the end, they told me to send a VAT fee of about €310. That was when I knew they were internet scammers.

Some of those that commit cyber crimes are young that they do not know the nature of the music they will face when caught. Like the case of young boy of 15 years who was trying to shut down yahoo, E*Trade, global crossing, CNN and eBay in Canada. He said at the time when he was caught that he did not understand the consequences of his actions.

The cyber spies and terrorists make use of shielded proxy server to hide their internet protocol addresses (IP). Whenever they make use of this, there is difficulty in finding who they are. They can hide their identities and sent signals throughout the whole world, deceiving people and scamming them at the same time. They can pretend to be Ghana while their root is in China.

Many are duped through the internet today. The crime partakers conform to be company owners while they do not own any thing. From online they demand for cash from the ‘yet to be preyed’ individual. The ‘prey’ in many occasions has fallen victim.

The online terrorists ‘attach’ something on themselves before they betray their victims. You may ask what I meant. Some of them are very fetish which makes the victims to summit to their wishes. They use their magical power to get all they need through the internet. These practices are found mainly in rural and traditional areas.

Some states and non-states of the world sponsor cyber hacking. There is serious alarming bell ringing from this side because those who are to fight hacking are now the hackers. Seoul believes North Korea runs an internet warfare unit aimed at hacking U.S and South Korea government and military networks to gather information and disrupt service. The question now is "why are the countries fighting each other? The possible answer is for power.

So many computers and valuable machines have been destroyed because of the rapid growth in the hacking ‘businesses’. Computer networks at major South Korean banks and top TV broadcasters crashed en masse Wednesday, paralyzing bank machines across the country and prompting speculation of a cyber attack by North Korea. I called it business because many are paid for hacking into other people’s systems.

The Way Forward: Possible Ideas/Solutions on how to Arrest or Limit Cyber Threats

Investigations have shown that the challenges being faced by the cyber world have some internal employees as among the causes.The challenges posed by the internet threat have and is still pissing the masses off. Some telecommunication and other companies whose network services are tampered with should look into their worker. At times the workers are like spies to the company. They leak the security keys to the internet hackers.

Thorough investigation should be carried out on any who wants to be the big wheel of any company that makes use of computer in storing their valuable data. This is to be sure that the fellow will not let the

cat out of the bag. When some of them finally become the managers of one company or the other, they do not protect the internet security keys that lead to the stored data of the companies. There should be proper evaluations on the managers of all companies based on how trustworthy they are.

People must be taught the danger of fetish practices as this can doom the image of the world. Teaching against fetish practices should be carried out in different rural areas. Archaic practices that display fetish involvement should be destroyed. Seminars should be organized where people will be taught on the danger of fetish practices and how it affects the society negatively.

Those that scam others through internet corporation email providers like yahoo mail, Hotmail and Gmail can be traced. Whenever any scam is received from any email account owner that has 'yahoo', 'Gmail', Hotmail or any related attached to it, the internet corporate company should be hold responsible to provide the source. With the scammers information which the corporate companies have on their data base, these scammers can be traced and fished out.

The government and anti-scam agencies should help fight this. Stronger anti-scam agencies should be created. The government must give the maximum support to have positive results at the end of the fight. These agencies should work in every part of the world and there is to be subdivisions of these agencies in each nation.

Nations should stop being enemies of progress to others. They should stop hacking other countries information. Countries who think that they are superior to the other and therefore can hack into other countries information should lay low. They should not be too proud. Any nation that hacks into others information should be seriously handled with huge fine.

I noticed that some countries are still not worried on fighting cybercrime. More organizations that resist the threat of cyber criminals must be created like those organized by council of Europe. The Council of Europe helps countries to ratify, accede and implement these treaties through technical cooperation projects. There will be more eradication of these crimes if other nations adopt the culture of the council of Europe on fighting these threats.

Computers that do not hide the identities of the hackers and their likes are to be manufactured. This will enable easy access to the cyber criminals. With their Mac and IP addresses displayed, they can easily be located by the cyber crime fighters.

Severe punishments should be given to the cyber offenders when caught. They are to be tortured to provide their co-workers. This will be a lesson to other partakers. With the punishment displayed publicly even through television channels, others will repent and stop anything relating to cyber threat. There should be no compromise in the punishment as some of the offenders may be related to top government officials.

Some students have accusing finger pointing at them. Many of them are into hacking due to lack of basic academic needs and ignorance. These students learn these illegal activities from bad citizens. Majority of the students at the hacking schools are young Nigerians who want to improve on their computer knowledge and make ends meet with the knowledge gained, whether ethical, legal or not. Scholarships and proper attentions are to be rendered to them. Agencies should be sent in many institutions to advise them on the danger of hacking into computer networks. There should be creation of secret anti cyber crime members who are to be students of the universities or schools. Nobody should know that such exists. Their functions will be to report student scammers or hackers to the main anti internet criminals’ organizations in the country.

The youth get involved in hacking because of unemployment. Good jobs and youth empowerment should be carried out to stop this crisis of internet crime. Over 67 million Nigerian youths are unemployed and the scenario opens the country to a major crisis if not quickly addressed. According to National Population Commission (NPC), in 2006, Nigerian youths are about 80 million. When 67 million are unemployed, how many are now employ?

More powerful and stronger anti-malware should be produced. Governments and private companies should sponsor this discovery. People may be surprise that viruses and their related types are threats to the internet. They are very big threat because they have destroyed many valuable documents in the society of today.

The internet hoodlums should be called for dialogue. With this mean, their problems will be known and settled at the same time. The truth is that these scammers are intelligent but they apply them in a negative way. These intelligent of theirs can be converted to something which is helpful to the society when addressed based on dialogue.

Those who just started browsing the internet should be tutored on the internet scammers so that they will not fall victims. When a hacker demands for money from email account holder in order to receive bigger reward and the later refuses, I believe that when he does not get 'customers', he will be compelled to change. These teaching can be conducted just for two minutes whenever any who wants to start using the internet goes to buy computer. Also, a simples tutorial can be inculcated in inter browsers in such a way that the user will be taught about scammers the first time he wants to use the internet with a minute.

Some hackers steal the identity of bank account owners and go to banks and withdraw money using fake cheques. The owner of any account must be called whenever he is not the one that comes to withdraw. From there, the cyber criminal will be held captive. This is to avoid stories that touch the heart. The EFCC confirmed that in the past three weeks, it has received increasing complains from bank customers of possible breach of their account by the bank workers. EFCC stands for the Economic and Financial Crime Commission of Nigeria.

Some publish fake information online; they extort money from people. The solution is that those websites that publicize this kind of information should be hold to provide their source. Some good amount of money was extorted from university students when I was in my year two in the name of scholarships.


Cyber criminals have made so many regret of their existence in this universe. Many samples of cyber threats have been detailed out. Combating cyber threat is not a day job, but, we can do it. All and Sundry must partake-both the government and the individuals. If the possible ideas are put into practice, we will reduce cyber threats. Try and shun cyber treat the way you can.


Economic and Financial Crime Commission of Nigeria;

Action against Economic Crime (Cybercrime) written by the Council of Europe;

Business Week news on the topic ‘South Korea: Chinese Address Source of Attack;

Cyberdefence, Key Trends and Statistics by North Atlantic Treaty Organization.


    0 of 8192 characters used
    Post Comment
    • Uzochukwu Mike profile imageAUTHOR

      Okwuagbala Uzochukwu Mike P 

      3 years ago from Oba


    • Uzochukwu Mike profile imageAUTHOR

      Okwuagbala Uzochukwu Mike P 

      3 years ago from Oba



    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)