Cyber-Security and Human Rights Violation in Nigeria.

Photo by Nahel Abdul
  • Select computer as their target: These criminals attack other people’s computers to perform malicious activities, such as spreading viruses, data theft, identity theft, etc.
  • Uses computer as their weapon: They use the computer to carry out “conventional crime”, such as spam, fraud, illegal gambling, etc.
  • Uses computer as their accessory: They use the computer to save stolen or illegal data.

Developers. Not Cyber Criminals.

Photo by Isaiah Rustad

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Omoyemi Arigbanla

Tech enthusiast | Petroleum engineer and software developer | Philosopher | Traveler | Writer.