Call For Papers
Contact Us

  Statistics of Cybercrime from 2016 to the First Half of 2020  
  Authors : Dr. Fatma Abdalla Mabrouk Khiralla
  Cite as:


Expansion of electronic transaction raised the need for more confidentiality and data protection against cybercrime. Cybercrime is defined as a criminal activity that targets internet users. Cybercriminals who commit cybercrime usually aim to make money through this action, but they could also tend to damage computers for reasons other than profit. Cybercriminals could be individuals or organizations. Some cybercriminals are highly technically skilled, well organized, and use advanced techniques. Information technology security specialists have reported a significant increase in cybercrime since early 2001. Cybercrime is expanding because the information technology has become a fundamental part of people's lives. Expansion of cybercrime raised the need to Cybersecurity and information security. Cybersecurity is defined as the practice of protecting information and data from outside sources on the Internet. Information security is defined as the protection of information and information systems from unauthorized use, assess, modification or removal. In this paper, statistics of Cybercrime has been analyzed from 2016 to the First Half of 2020, beside a summarization of cybersecurity and information security, projecting the difference between cybersecurity and knowledge of security.


Published In : IJCSN Journal Volume 9, Issue 5

Date of Publication : October 2020

Pages : 252-261

Figures :08

Tables : --


Dr. Fatma Abdalla Mabrouk Khiralla : She worked Lecturer in the Faculty of Computer Science and Information Technology - Shaqra University, working now as Assistant Professor on Faculty of Science and Arts Unizah, Department of Computer Science Qassim. She has obtained Doctor of Philosophy (Ph.D.) from Computer Science National University of Rabat Sudan in 2017. She has obtained also Master of Computer Science and Information from Faculty of Engineering and Technology - University of Gezira in 2003. Moreover, she has obtained Bachelor Computer Science from College of Computer Sudan University College for Girls. She has published Book is Database Hiding On Tag Web Using Steganography by Genetic Algorithm , LAP LAMBERT Academic Publishing,15 July 2019.she has 4 Published Papers in the International Journal of Innovations & Advance in Computer Science IJIACS.


Cybersecurity-Information Security- Data Science -Cybercrime- Social Engineering- Artificial Intelligence-Internet of Things

This paper recommends that awareness of cybersecurity and information security is very important when using the web. When analyzing the attacks between 2016 and the beginning of 2020, it was found that the attacks were carried out through mistakes and holes that could have been solved if there were more consideration and knowledge about these holes and mistakes. It is essential to be careful when using sensitive information, and it is obligatory to secure data from electronic attacks and identify the holes through which the attackers get through to get to sensitive data. It is necessary to be aware of the strategies utilized by cybercriminals during cyberattack.It was clearly found that social engineering was clear within the 2020 cyberattack. There must be more awareness of how to search appropriately, download programs, and more attention when employing a smart device, especially internet of thing techniques, because it was found the internet of thing techniques was the most important device to expand cybercrime in the last few years.


[1] Edephonce Ngemera Nfuka .el al.,2014,The Rapid Growth of Cybercrimes Affecting Information Sys, INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE ,M. Mshangi et al., Vol. 3, No. 2,pp.182-199. [2] Tabrez Ahmad , Corona Virus (COVID-19) Pandemic and Work from Home:Challenges of Cybercrimes and Cybersecurity, 2020,Available at SSRN: Available at :http://dx.doi.org/10.2139/ssrn.3568830 [3] Kenneth Okereafor , Olajide Adebola,2020 ,Tackling The Cybersecurity Impacts Of The Coronavirus Outbreak As A Challenge To Internet Safety Article , international jornal In IT February & Engineering ,pp.1-11. [4] Hussain Aldawood ,Geoffrey Skinner,2019,Social Engineering: Hacking a Human Being through Technology , International Journal of Security (IJS), Volume (10) : Issue (1) ,pp.1-15. [5] M. E. Kabay ,A Brief History of Computer Crime:An Introduction, Copyright 2008 M. E. Kabay. [6] Kelly White (2013),The Rise of Cybercrime 1970 through 2010 ,Available at https://drive.google.com/file/d/0B_GoF8uQ95lGWU1RMXZ0WmV2YnM/edit, Accessed on 12/6/2020. [7] Steve Morgan (2017),2017 Cybercrime Report Steve Morgan, Editor-in-Chief Cybersecurity Ventures , Available at : https://cybersecurityventures.com/2015-wp/wp-content/uploads/2017/10/2017-Cybercrime-Report.pdf , Accessed on 14/6/2020. [8] Cybersecurity Ventures (Dec 13, 2018), Cyberattacks are the fastest growing crime and predicted to cost the world $6 trillion annually by 2021 , Available at :https://www.prnewswire.com/news-releases/cyberattacks-are-the-fastest-growing-crime-and-predicted-to-cost-the-world-6-trillion-annually-by-2021-300765090.html , Accessed on 8/6/2002. [9] Einaras von Gravrock (04 Mar 2019) ,Here are the biggest cybercrime trends of 2019,Available at :https://www.weforum.org/agenda/2019/03/here-are-the-biggest-cybercrime-trends-of-2019/, Accessed on 11/6/2020. [10] James Cook (May 14, 2017,), The world's 10 biggest cybercrime hotspots in 2016, ranked, Available at : https://amp.insider.com/worlds-10-cybercrime-hotspots-in-2016-ranked-symantec-2017-5 , Accessed on 1/6/2020. [11] St. Petersburg, Fla (2020).,The 15 Top DDoS Statistics You Should Know In 2020,Available at:https://cybersecurityventures.com/the-15-top-ddos-statistics-you-should-know-in-2020/,Sybercrime magazine ,Accessed on 19/6/2020. [12] CEA ., The Council of Economic Advisers 9February 2018), The Cost of Malicious Cyber Activity to the U.S. Economy ,Available at:https://www.whitehouse.gov/wp-content/uploads/2018/03/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf,Accessed on 13/6/2020 . [13] Krebs on Security (2016), "Hacked Cameras, DVRs Powered Today's Massive Internet Outage.", Available at:https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/#:~:text=A%20massive%20and%20sustained%20Internet,video%20recorders%2C%20new%20data%20suggests, Accessed on 16/6/2020 . [14] Symantec (March 2018 ), 2018 Internet Security Threat Report,Available at:https://docs.broadcom.com/doc/istr-23-2018-executive-summary-en-aa , Accessed on 16/6/2020. [15] Emmanuel Marshall (29 December 2017) , Cybercrime 2017: This Year's Big Stories, Available at :https://www.mailguard.com.au/blog/cybercrime-2017-headlines , Accessed on 16/6/2020. [16] Norton Rose Fulbright (May 17, 2017),WannaCry Ransomware Attack Summary, Available at