Cyber Crime and Necessity of Cyber Security Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

With the advancing technology and increased internet connectivity, many people around the world are using online sites for various activities. Organizations as well as individuals have found it safe to store their most valued information on the internet. This has increased accessibility of information while enhancing the flow of information.

Unfortunately, the same technological advancements have been used by people with ulterior motives to take advantage of private information, or even disrupt normal operations of an organization. Consequently, there is need to enforce policies that will help in protecting organizational information and systems from criminals.

The Cyber Intelligence Sharing and Protection Act (CISPA)

This is one of the policies that has been proposed to curb cyber crimes and is being debated in the congress. The Act proposes the sharing of information between the U.S. government and other security agencies including technology and manufacturing companies.

The main aim is to establish communication channels between private firms and government intelligence bodies to enhance sharing of potential and emerging cyber security threats (Rachael, 2013).This is meant to enable the government to investigate cyber threats thus enhance systems security.

Advantages

CISPA is expected to increase detection of cyber security threats and thus help in reduction of cyber crimes. On the same note, CISPA includes in its definition intellectual property which is the most risky material. Moreover, the systems of United States which are vital for every day live needs protection from hackers and this Act serves just that purpose (Foss, 2012). The Act also seeks to enhance confidence of people and organizations on the internet and various systems in general.

Disadvantages

Nevertheless, the Act has been opposed by majority of people both from the government and from the private sector. Firstly, some people are very concerned with the inclusion of intellectual property as one of the reasons for sharing information. It has been argued that the

Act is so vague on this matter which might lead to infringement of the right to privacy. On top, security agencies can use this leeway to screen people’s communication in the pretext of searching for potential cyber threats. Similarly, critics have argued that the Act gives security personnel excuses to interfere and even messing up with people’s information because no legal action can be taken against them (Foss, 2012).

It is not only the CISPA Act that has been proposed to counter cyber threats. There was the Stop Online Piracy Act which was defeated because it included intellectual property theft. On the same note, U.S. representative Dan Lungren proposed the Precise Act which after dropping grave provisions will be debated together with the CISPA.

Additionally, there is the Federal Information Security Amendment Act of 2012. Contrary to the CISPA, many of these other Acts have not included intellectual property in any of their clauses. However, they are all aiming at the same goal of eliminating chances of cyber crime taking place (Rachael, 2013).

Conclusion

Cyber security is a necessity given the increasing number of cyber crimes that are being recorded. In this regard, any step that will help in identifying possible security threats should be highly encouraged. However, care should be taken so as not to interfere with people’s right to privacy. Furthermore, drafting of the Bills should avoid vague language that will leave loopholes for people to misapply the law.

References

Foss, S. H. (2012). . New York Times. Web.

Rachael, K. (2013). . The Wall Street Journal. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, December 11). Cyber Crime and Necessity of Cyber Security. https://ivypanda.com/essays/cyber-crime/

Work Cited

"Cyber Crime and Necessity of Cyber Security." IvyPanda, 11 Dec. 2018, ivypanda.com/essays/cyber-crime/.

References

IvyPanda. (2018) 'Cyber Crime and Necessity of Cyber Security'. 11 December.

References

IvyPanda. 2018. "Cyber Crime and Necessity of Cyber Security." December 11, 2018. https://ivypanda.com/essays/cyber-crime/.

1. IvyPanda. "Cyber Crime and Necessity of Cyber Security." December 11, 2018. https://ivypanda.com/essays/cyber-crime/.


Bibliography


IvyPanda. "Cyber Crime and Necessity of Cyber Security." December 11, 2018. https://ivypanda.com/essays/cyber-crime/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1