Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
The White House sought to establish a National Cybersecurity Commission that would be composed of security experts from both the public and private commission. This commission would be mandated to lead the way in investigating, detecting and offering recommendations regarding all forms of possible attacks.
The commission was also supposed to foster and discover better and more viable solutions. In addition, the Cybersecurity commission would be expected to modernize government IT according to the proposals of the White House. Another approach of the White House was to educate American citizens to be more careful when using their online accounts (Eastton & Taylor, 2011). The White House also recommended additional investment into the Cybersecurity kitty.
In regards to the receipt of threats related to cyber, policies and procedures should be created by the President according to the proposals of the House. Thereafter, Congress should be allowed to debate and pass resolutions on all the forwarded threat indicators. On the other hand, heads of relevant agencies should work with the Attorney General before submitting any findings to Congress according to the proposals of the Senate (Fischer, 2013).
One of the areas of cyber laws that seem to be moving forward is the inclusive sharing of threats related to cyberspace. As it stands now, private entities can swiftly boost their security levels by accessing vital information from the government and other private organs. Information sharing on all possible threats and attacks has been a major gain in the fight against cyber-related threats (Jaishankar, 2011).
Second, both private and federal agencies have significantly embraced and deployed threat detection and prevention measures (Fischer, 2013). Second, there have been positive moves in research and development of Cybersecurity. Apart from just providing surplus funds, the Federal government has recruited, trained and equipped more personnel to assist in handling emerging threats (Eastton & Taylor, 2011). New threats have been identified through the help of on-going research and development.
Public awareness and sensitization programs on cyberspace security have also been in the right direction. As it stands now, most individuals are now keener on how to protect themselves against online fraudsters. The ability to safeguard individual online accounts is a major gain as far as Cybersecurity is concerned (Bowker, 2012).
The future of cyberlaw presents myriads of challenges that should be tackled with a lot of sobriety. For instance, it is apparent that cybercrimes will continue to be more sophisticated with the passage of time. As financial cybercrime grows more complicated and difficult to track down, governments will be compelled to be very dynamic in the development of effective cyber laws and online fraud prevention measures. Besides, cyber laws will probably demand mandatory laptop encryption in order to boost security measures. New equipments will also be pre-installed with clients’ data especially among organizations that store private information for their users (Eastton & Taylor, 2011).
Cyber laws are also expected to be made universal across the board regardless of location (Whitman & Mattord, 2011). Since cybercrimes usually go viral and cover large distances within a short time, governments will be compelled to institute more effective collaboration in order to deal with the sporadic cases of cyber threats (Fischer, 2013). Moreover, cyber laws that will be enacted in the future will be more stringent to deter both old and emerging criminals.
References
Bowker, A. (2012). The Cybercrime Handbook for Community Corrections: Managing Risk in the 21st Century. Springfield: Charles C. Thomas Publishers, Ltd.
Eastton, C., & Taylor, J. (2011). Computer Crime, Investigation, and the Law Boston, MA: Course Technology, Cengage Learning.
Fischer, E. A. (2013). Federal laws related to cyber-security: Overview and discussion of proposed revisions (Congressional Research Service Report R42114). Web.
Jaishankar, K. (2011). Cyber Criminology: Exploring Internet Crimes and Criminal behavior. Boca Raton: CRC Press.
Whitman, M. E., & Mattord, H. (2011). Reading & Cases in Information Security: Law & Ethics. Boston, MA: Course Technology, Cengage Learning.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.