Cyber Crime and Necessity of Cyber Security Report

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Jan 29th, 2024

Introduction

With the advancing technology and increased internet connectivity, many people around the world are using online sites for various activities. Organizations as well as individuals have found it safe to store their most valued information on the internet. This has increased accessibility of information while enhancing the flow of information.

We will write a custom essay on your topic a custom Report on Cyber Crime and Necessity of Cyber Security
808 writers online

Unfortunately, the same technological advancements have been used by people with ulterior motives to take advantage of private information, or even disrupt normal operations of an organization. Consequently, there is need to enforce policies that will help in protecting organizational information and systems from criminals.

The Cyber Intelligence Sharing and Protection Act (CISPA)

This is one of the policies that has been proposed to curb cyber crimes and is being debated in the congress. The Act proposes the sharing of information between the U.S. government and other security agencies including technology and manufacturing companies.

The main aim is to establish communication channels between private firms and government intelligence bodies to enhance sharing of potential and emerging cyber security threats (Rachael, 2013).This is meant to enable the government to investigate cyber threats thus enhance systems security.

Advantages

CISPA is expected to increase detection of cyber security threats and thus help in reduction of cyber crimes. On the same note, CISPA includes in its definition intellectual property which is the most risky material. Moreover, the systems of United States which are vital for every day live needs protection from hackers and this Act serves just that purpose (Foss, 2012). The Act also seeks to enhance confidence of people and organizations on the internet and various systems in general.

Disadvantages

Nevertheless, the Act has been opposed by majority of people both from the government and from the private sector. Firstly, some people are very concerned with the inclusion of intellectual property as one of the reasons for sharing information. It has been argued that the

Act is so vague on this matter which might lead to infringement of the right to privacy. On top, security agencies can use this leeway to screen people’s communication in the pretext of searching for potential cyber threats. Similarly, critics have argued that the Act gives security personnel excuses to interfere and even messing up with people’s information because no legal action can be taken against them (Foss, 2012).

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

It is not only the CISPA Act that has been proposed to counter cyber threats. There was the Stop Online Piracy Act which was defeated because it included intellectual property theft. On the same note, U.S. representative Dan Lungren proposed the Precise Act which after dropping grave provisions will be debated together with the CISPA.

Additionally, there is the Federal Information Security Amendment Act of 2012. Contrary to the CISPA, many of these other Acts have not included intellectual property in any of their clauses. However, they are all aiming at the same goal of eliminating chances of cyber crime taking place (Rachael, 2013).

Conclusion

Cyber security is a necessity given the increasing number of cyber crimes that are being recorded. In this regard, any step that will help in identifying possible security threats should be highly encouraged. However, care should be taken so as not to interfere with people’s right to privacy. Furthermore, drafting of the Bills should avoid vague language that will leave loopholes for people to misapply the law.

References

Foss, S. H. (2012). . New York Times. Web.

Rachael, K. (2013). . The Wall Street Journal. Web.

Print
Need an custom research paper on Cyber Crime and Necessity of Cyber Security written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, January 29). Cyber Crime and Necessity of Cyber Security. https://ivypanda.com/essays/cyber-crime/

Work Cited

"Cyber Crime and Necessity of Cyber Security." IvyPanda, 29 Jan. 2024, ivypanda.com/essays/cyber-crime/.

References

IvyPanda. (2024) 'Cyber Crime and Necessity of Cyber Security'. 29 January.

References

IvyPanda. 2024. "Cyber Crime and Necessity of Cyber Security." January 29, 2024. https://ivypanda.com/essays/cyber-crime/.

1. IvyPanda. "Cyber Crime and Necessity of Cyber Security." January 29, 2024. https://ivypanda.com/essays/cyber-crime/.


Bibliography


IvyPanda. "Cyber Crime and Necessity of Cyber Security." January 29, 2024. https://ivypanda.com/essays/cyber-crime/.

Powered by CiteTotal, easy referencing machine
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1