Skip to content

Cybercrime

Intermediate

Cybercrime encompasses any criminal activity that involves a computer, networked device, or digital network as either the target, the tool, or the means of the offense. As societies have become deeply dependent on digital infrastructure, cybercrime has grown into one of the most significant threats facing individuals, corporations, and governments worldwide. The category spans a vast range of illegal conduct, from financially motivated attacks such as ransomware and credit card fraud to politically motivated activities like state-sponsored espionage and hacktivism. The global cost of cybercrime is estimated to exceed ten trillion dollars annually by the mid-2020s, making it more profitable than the entire global illegal drug trade.

The study of cybercrime draws from multiple disciplines including computer science, criminal justice, law, psychology, and international relations. Technical understanding of attack vectors, malware, network protocols, and encryption is essential, but equally important are the legal frameworks that define and prosecute these offenses. Key legislation includes the Computer Fraud and Abuse Act in the United States, the Computer Misuse Act in the United Kingdom, and the Budapest Convention on Cybercrime, the first international treaty addressing internet and computer crime. Investigators and analysts must also understand the psychology of threat actors, who range from lone individuals seeking financial gain to organized criminal syndicates and nation-state advanced persistent threat groups.

Modern cybercrime defense relies on a layered approach combining technology, policy, and human awareness. Organizations deploy firewalls, intrusion detection systems, endpoint protection, and security information and event management platforms, while simultaneously training employees to recognize social engineering attacks. Digital forensics teams preserve and analyze electronic evidence for legal proceedings, and incident response plans ensure organizations can contain and recover from breaches. As emerging technologies like artificial intelligence, the Internet of Things, and quantum computing reshape the digital landscape, both the attack surface and the defensive toolkit continue to evolve rapidly.

Practice a little. See where you stand.

Ready to practice?5 minutes. No pressure.

Key Concepts

One concept at a time.

Explore your way

Choose a different way to engage with this topic — no grading, just richer thinking.

Explore your way — choose one:

Explore with AI →
Curriculum alignment— Standards-aligned

Grade level

Grades 9-12College+

Learning objectives

  • Identify major categories of cybercrime including identity theft, ransomware attacks, and online fraud schemes
  • Apply digital forensic techniques to preserve chain of custody and extract evidence from compromised systems
  • Analyze the socioeconomic factors and technological vulnerabilities that enable organized cybercriminal operations globally
  • Evaluate international legal frameworks and cross-border cooperation mechanisms for prosecuting transnational cybercrime networks

Recommended Resources

This page contains affiliate links. We may earn a commission at no extra cost to you.

Books

Cybersecurity and Cyberwar: What Everyone Needs to Know

by P.W. Singer & Allan Friedman

The Art of Intrusion

by Kevin Mitnick & William Simon

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

by Kim Zetter

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

by Andy Greenberg

Courses

Introduction to Cyber Security

CourseraEnroll

Computer Forensics

edXEnroll
Cybercrime - Learn, Quiz & Study | PiqCue