The National Cyber-Security Legislation Report (Assessment)

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

The White House sought to establish a National Cybersecurity Commission that would be composed of security experts from both the public and private commission. This commission would be mandated to lead the way in investigating, detecting and offering recommendations regarding all forms of possible attacks.

The commission was also supposed to foster and discover better and more viable solutions. In addition, the Cybersecurity commission would be expected to modernize government IT according to the proposals of the White House. Another approach of the White House was to educate American citizens to be more careful when using their online accounts (Eastton & Taylor, 2011). The White House also recommended additional investment into the Cybersecurity kitty.

In regards to the receipt of threats related to cyber, policies and procedures should be created by the President according to the proposals of the House. Thereafter, Congress should be allowed to debate and pass resolutions on all the forwarded threat indicators. On the other hand, heads of relevant agencies should work with the Attorney General before submitting any findings to Congress according to the proposals of the Senate (Fischer, 2013).

One of the areas of cyber laws that seem to be moving forward is the inclusive sharing of threats related to cyberspace. As it stands now, private entities can swiftly boost their security levels by accessing vital information from the government and other private organs. Information sharing on all possible threats and attacks has been a major gain in the fight against cyber-related threats (Jaishankar, 2011).

Second, both private and federal agencies have significantly embraced and deployed threat detection and prevention measures (Fischer, 2013). Second, there have been positive moves in research and development of Cybersecurity. Apart from just providing surplus funds, the Federal government has recruited, trained and equipped more personnel to assist in handling emerging threats (Eastton & Taylor, 2011). New threats have been identified through the help of on-going research and development.

Public awareness and sensitization programs on cyberspace security have also been in the right direction. As it stands now, most individuals are now keener on how to protect themselves against online fraudsters. The ability to safeguard individual online accounts is a major gain as far as Cybersecurity is concerned (Bowker, 2012).

The future of cyberlaw presents myriads of challenges that should be tackled with a lot of sobriety. For instance, it is apparent that cybercrimes will continue to be more sophisticated with the passage of time. As financial cybercrime grows more complicated and difficult to track down, governments will be compelled to be very dynamic in the development of effective cyber laws and online fraud prevention measures. Besides, cyber laws will probably demand mandatory laptop encryption in order to boost security measures. New equipments will also be pre-installed with clients’ data especially among organizations that store private information for their users (Eastton & Taylor, 2011).

Cyber laws are also expected to be made universal across the board regardless of location (Whitman & Mattord, 2011). Since cybercrimes usually go viral and cover large distances within a short time, governments will be compelled to institute more effective collaboration in order to deal with the sporadic cases of cyber threats (Fischer, 2013). Moreover, cyber laws that will be enacted in the future will be more stringent to deter both old and emerging criminals.

References

Bowker, A. (2012). The Cybercrime Handbook for Community Corrections: Managing Risk in the 21st Century. Springfield: Charles C. Thomas Publishers, Ltd.

Eastton, C., & Taylor, J. (2011). Computer Crime, Investigation, and the Law Boston, MA: Course Technology, Cengage Learning.

Fischer, E. A. (2013). (Congressional Research Service Report R42114). Web.

Jaishankar, K. (2011). Cyber Criminology: Exploring Internet Crimes and Criminal behavior. Boca Raton: CRC Press.

Whitman, M. E., & Mattord, H. (2011). Reading & Cases in Information Security: Law & Ethics. Boston, MA: Course Technology, Cengage Learning.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, September 27). The National Cyber-Security Legislation. https://ivypanda.com/essays/the-national-cyber-security-legislation/

Work Cited

"The National Cyber-Security Legislation." IvyPanda, 27 Sept. 2020, ivypanda.com/essays/the-national-cyber-security-legislation/.

References

IvyPanda. (2020) 'The National Cyber-Security Legislation'. 27 September.

References

IvyPanda. 2020. "The National Cyber-Security Legislation." September 27, 2020. https://ivypanda.com/essays/the-national-cyber-security-legislation/.

1. IvyPanda. "The National Cyber-Security Legislation." September 27, 2020. https://ivypanda.com/essays/the-national-cyber-security-legislation/.


Bibliography


IvyPanda. "The National Cyber-Security Legislation." September 27, 2020. https://ivypanda.com/essays/the-national-cyber-security-legislation/.

Powered by CiteTotal, easy essay citation maker
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1