StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

THE LEGAL ISSUE IN NETWORK SECURITY USA - Essay Example

Cite this document
Summary
THE LEGAL ISSUE IN NETWORK SECURITY USA Abstract The paper discusses the legal issues which plague network security in the US. People might find it hard when the information shared by them is stolen by others or the information is misused. These things are quite common as people might fail to notice initially…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
THE LEGAL ISSUE IN NETWORK SECURITY USA
Read Text Preview

Extract of sample "THE LEGAL ISSUE IN NETWORK SECURITY USA"

Download file to see previous pages

Network security looks after the Local Area Network (LAN) from the external world. For the computer based crimes, it is hard to enforce any law on legal basis as the computer or the network cannot be restricted by boundaries of a country around it. There are many issues that US legal system face when dealing with the computer based crimes as they are bound in one or the other ways. This has made the criminals get a chance to misuse the available resource and be safe from legal issues. Following are some of the federal computer crime laws and status aid the US department: FERPA, TEACH and GLBA Act: ECPA and CFAA Act and Economic Espionage Act (EEA).

Though there are many laws, it is important for a common man to know them so that they can use the right one at a given time. The legal system is found to be a part of the society and it cannot do anything in case the owner of a site won’t take the advantage of it. Hence, the major incidents related to network security, the progression of laws for safeguarding network security and the future of network security from a legal standpoint is detailed in the paper. TABLE OF CONTENTS 1. Introduction 4 2.

Computer and Networks 5 3. Legal issues in Network Security 6 4. Preliminary Boards and Projects for Network Security 7 5. Idea of Separate Jurisdiction 8 6. Law for e-Commerce to Avoid Identification Theft 9 7. The Cyber Crime Agreement 9 8. Approval for Electronic Signature 10 9. Laws for Federal Computer Crimes 10 9.1 The FERPA, TEACH and GLBA Act: 11 9.2 The ECPA and CFAA Act: 11 9.3 Other Laws Used to act against Computer Crimes: 12 10. Controversy 12 11. Goal of Network Security 15 12. Conclusion 15 13.

References 19 1. Introduction Today’s world rises with the use of the computer for almost everything. With the introduction of internet, the world is able to keep in touch with one another. Either a common man or a company can do this without moving even an inch but share all the information with the help of the strong network. When the network gains importance, the issue with it will also be very important. Having a personal computer is not the only need but one should know how to protect the information that they have in it.

Network security can include elements such as intrusion detection systems traffic shaping and firewalls (The Gordon Schools, 2011).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“THE LEGAL ISSUE IN NETWORK SECURITY USA Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
THE LEGAL ISSUE IN NETWORK SECURITY USA Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1476086-the-legal-issue-in-network-security-usa
(THE LEGAL ISSUE IN NETWORK SECURITY USA Essay Example | Topics and Well Written Essays - 750 Words)
THE LEGAL ISSUE IN NETWORK SECURITY USA Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1476086-the-legal-issue-in-network-security-usa.
“THE LEGAL ISSUE IN NETWORK SECURITY USA Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1476086-the-legal-issue-in-network-security-usa.
  • Cited: 0 times

CHECK THESE SAMPLES OF THE LEGAL ISSUE IN NETWORK SECURITY USA

Security of Digital Signatures

The paper "security of Digital Signatures" deals with digital signatures, as they are considered to be addressing integrity, confidentiality, and non-repudiation of data exchanged digitally, the history of cryptography as the first concept that derived digital signatures and encryption algorithms.... hellip; Information security is an absolute essential for business and organizations.... Likewise, information security has three fundamental dimensions i....
14 Pages (3500 words) Literature review

Homeland Terrorism Security

The major Federal legislation on terrorist financing include; The Bank Secrecy Act, the International Emergency Economic Powers Act, The Money Laundering Control Act, The Annunzio-Wylie Anti-Money Laundering Act, the Money Laundering Suppression Act, The Money Laundering and Financial Crimes Strategy Act, Title III of the usa Patriot Act, The Suppression of the Financing of Terrorism Convention Implementation Act and The Intelligence Reform and Terrorism Prevention Act of 2004, (GAO, 2004)....
3 Pages (750 words) Essay

The Legal and Law Issues in Network Security USA

The paper discusses the legal issues which plague network security in the US.... The major incidents related to network security, the progression of laws for safeguarding network security and the future of network security from a legal standpoint is detailed in the paper as well.... The network security does not mean to lock the computer from accessing internet but it is about the information that is stored in the computer which has to be protected to use it by oneself....
15 Pages (3750 words) Research Paper

Network Security

This essay talks about network security.... hellip; According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information.... As the paper highlights network security guarantees authentication, availability, integrity and confidentiality is important to note that “network security is not absolute”....
10 Pages (2500 words) Research Paper

Cyber Security

In countries such as usa, the statistics associated with the cyber-crime is increasing rapidly.... With the situation so alarming, the President of usa, Barack Obama forced to declare the month of... The main objective of this paper is to analyze the concept of cyber security in association with a recent international event.... The paper seeks to answer questions related to cyber security such as: who is been harmed and by whom, what is the harm/causation, what is the broader implication of the harm and what is the major moral issue on hand....
10 Pages (2500 words) Term Paper

Homeland Security of the US

In 2002 a key court decision dismantled the legal wall (U.... The 2001 usa Patriot Act gives the President and federal government broad authority to go after the terrorists, to intercept their communications and stop their plots.... The provisions of the usa Patriot Act deal with expanded federal authority under the Foreign Intelligence Surveillance Act (FISA) and the Electronic Communications Privacy Act (ECPA).... Attorney John Ashcroft is credited with breaking the wall erected by former Attorney General Janet Reno in the mid-1990s) separating the FBI's criminal and intelligence probes, thus making the sharing of information easier; it also contributed to an increase in FISA On July 21, 2005, both House and Senate approved proposals to reauthorize sections of the usa Patriot Act due to expire at the end of 2005....
11 Pages (2750 words) Case Study

Internet of Things and Internet Security

The paper "Internet of Things and Internet security" illuminates gadgets that are becoming smart and powerful and connectivity is no longer a problem.... Despite the advantages offered by the internet, there are growing concerns regarding security issues.... This paper aims at covering various levels of concern regarding the security of the Internet.... Furthermore, the paper talks about recent technological advances in the Internet and its security in brief, with respect to the growing threats in the present scenario....
12 Pages (3000 words) Case Study

Analysis of Voice over Internet Protocol - Security Issues and Solutions

… The paper “Analysis of Voice over Internet Protocol  - security Issues and Solutions” is a  spectacular variant of term paper on information technology.... The paper “Analysis of Voice over Internet Protocol  - security Issues and Solutions” is a  spectacular variant of term paper on information technology.... Though VoIP brings a number of benefits for its users at the same time it brings various security concerns that discourage the use of this technology....
19 Pages (4750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us