Cyber Crime and Necessity of Cyber Security

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Introduction

With the advancing technology and increased internet connectivity, many people around the world are using online sites for various activities. Organizations as well as individuals have found it safe to store their most valued information on the internet. This has increased accessibility of information while enhancing the flow of information.

Unfortunately, the same technological advancements have been used by people with ulterior motives to take advantage of private information, or even disrupt normal operations of an organization. Consequently, there is need to enforce policies that will help in protecting organizational information and systems from criminals.

The Cyber Intelligence Sharing and Protection Act (CISPA)

This is one of the policies that has been proposed to curb cyber crimes and is being debated in the congress. The Act proposes the sharing of information between the U.S. government and other security agencies including technology and manufacturing companies.

The main aim is to establish communication channels between private firms and government intelligence bodies to enhance sharing of potential and emerging cyber security threats (Rachael, 2013).This is meant to enable the government to investigate cyber threats thus enhance systems security.

Advantages

CISPA is expected to increase detection of cyber security threats and thus help in reduction of cyber crimes. On the same note, CISPA includes in its definition intellectual property which is the most risky material. Moreover, the systems of United States which are vital for every day live needs protection from hackers and this Act serves just that purpose (Foss, 2012). The Act also seeks to enhance confidence of people and organizations on the internet and various systems in general.

Disadvantages

Nevertheless, the Act has been opposed by majority of people both from the government and from the private sector. Firstly, some people are very concerned with the inclusion of intellectual property as one of the reasons for sharing information. It has been argued that the

Act is so vague on this matter which might lead to infringement of the right to privacy. On top, security agencies can use this leeway to screen people’s communication in the pretext of searching for potential cyber threats. Similarly, critics have argued that the Act gives security personnel excuses to interfere and even messing up with people’s information because no legal action can be taken against them (Foss, 2012).

It is not only the CISPA Act that has been proposed to counter cyber threats. There was the Stop Online Piracy Act which was defeated because it included intellectual property theft. On the same note, U.S. representative Dan Lungren proposed the Precise Act which after dropping grave provisions will be debated together with the CISPA.

Additionally, there is the Federal Information Security Amendment Act of 2012. Contrary to the CISPA, many of these other Acts have not included intellectual property in any of their clauses. However, they are all aiming at the same goal of eliminating chances of cyber crime taking place (Rachael, 2013).

Conclusion

Cyber security is a necessity given the increasing number of cyber crimes that are being recorded. In this regard, any step that will help in identifying possible security threats should be highly encouraged. However, care should be taken so as not to interfere with people’s right to privacy. Furthermore, drafting of the Bills should avoid vague language that will leave loopholes for people to misapply the law.

References

Foss, S. H. (2012). . New York Times. Web.

Rachael, K. (2013). . The Wall Street Journal. Web.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!