StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Suitability of Cybercrime Laws to Meet New Realities of the Internet - Essay Example

Cite this document
Summary
The paper "The Suitability of Cybercrime Laws to Meet New Realities of the Internet" discusses that the provision requiring that the government should publish the areas of weakness in both the private and the public sectors that are highly vulnerable to attacks needs to be modified…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful
The Suitability of Cybercrime Laws to Meet New Realities of the Internet
Read Text Preview

Extract of sample "The Suitability of Cybercrime Laws to Meet New Realities of the Internet"

The suitability of cybercrime laws to meet new realities of the Internet and computer crimes The internet has become a very dynamic platform, where changes occur with each passing day. Most often, technological inventions and advancements occur, changing the way the internet was operating previously. Thus, it has become very difficult to predict what changes will happen on the internet in the future. Similarly, the changing nature of the crimes that target computers, computer devices and the communication technology networks is uncertain (Guillaume 27). In this respect, there are various cybercrime laws that have been enacted to address the risks posed by cyber crimes and computer systems attacks. However, owing to the dynamic nature of the internet crimes targeting the computers and the information technology systems, the enacted cyber crime laws have fallen short of meeting the realities of the Internet and computer crimes (Guillaume 42). Thus such laws are associated with some aspects of strengths and weaknesses relating to curbing the computer and information technology attacks and crimes. In this respect, adapting existing laws to reflect the new realities of the Internet sometimes works and sometimes does not. Thus, this discussion seeks to analyze one of the existing cybercrime laws, to give an example of where it can be applied reasonably, and another example of where the law needs to be modified. Example of where the Cybersecurity Act of 2009 can be applied reasonably The Cybersecurity Act of 2009 - S.773 is one of the laws that have been established to reduce the risks that the computers and the communication technology networks within the USA are exposed to. According to section 2 of this law, titled findings, the failure of the USA to protect its cyber space is one of the urgent national security problems that are facing the country (Cybersecurity n.p.). In this respect, the law recommends various measures that should be taken to ensure that the government takes adequate measure to control the security threat. The measures are aimed at making the USA cyber space more secure and protected against the cyber security threats. One of such major recommendation that has been provided by the law is that, the president of the USA has the mandate to declare "cyber-emergency" (Kaplan n.p.). This provision is meant to enable the president of the USA to shut down any, or all internet traffic, under a situation where it is determined that there is a cyber attack threat that has the potential to affect the USA adversely. Such situations include cyber attacks that target the country’s major information infrastructure and installations, as well as the Internet, computer systems, and telecommunications networks (Cybersecurity n.p.). Further, the law provided that the government should publish all the major areas of weaknesses that the cyber criminals are likely to target. This way, both the public and the private sectors can take caution and address these areas of weaknesses, to ensure that their systems remains safeguarded against the malicious attacks of the cyber criminals (Lorber n.p.). In this respect, the provision of the law requiring that the president should declare "cyber-emergency", and take the necessary measures towards disabling the internet traffic that exposes the vital installations to security threats, can be reasonably implemented. The essence of the implementation of this provision is to allow for emergency measures to be taken, towards thwarting an attempt to attack vital national installations by the cyber criminals and the internet hackers. This is because; such attacks can be too costly for the country (Fox News n.p.). Further, such a provision is makes it possible to eliminate the delays that might be caused by the relevant legal procedures that should be followed to thwart such an attempt. Such lengthy and bureaucratic procedures may result in addressing the problem when it is too late, and the damage has already been done. In making this provision within this law, section 2 of the Cybersecurity Act of 2009 - S.773 related to findings on cyber security attacks, indicated that any attack that succeeds to affect a major financial provider would affect the whole economy. The findings also provided that a successful attack on vital physical infrastructure, such as an attack on the national power grid or the national refineries, would bring the economy of the country to a halt, even for weeks (Cybersecurity n.p.). Therefore, the implementation of the provision that allow the president to declare an emergency on such perceived attacks is reasonably applicable. The action can be able to address the situation before it can plunge the country into a disarray, arising from deeper economic and security disaster Example of where the Cybersecurity Act of 2009 needs to be modified Nevertheless, there is a necessity to make some modification to the provision of this law. Specifically, the provision requiring that the government should publish the areas of weakness in both the private and the public sector that are highly vulnerable to attacks, needs to be modified. That provision may pose a major cyber security threat, where such areas are not addressed adequately. There is a noble intention associated with this provision. The provision seeks to ensure that the major areas of weaknesses are addressed well in advance, so that the computer systems, the communication networks and the vital infrastructures remain guarded in advance against the malicious attacks (Kaplan n.p.). However, while such a noble intention exists, the weakness with this provision is that; it may work to the advantage of the cyber criminals and the system attackers. This is because, the attackers will be notified on the areas of weaknesses related to both the private and public systems that are vital in the country (Lorber n.p.). This way, they will plan attacks that will exploit the weaknesses of the institutions, and thus cause higher damage to the institutions, than it would have happened if such weaknesses were not published (Fox News n.p.). Therefore, it is necessary for the law to be modified, so that the provision is eliminated, and thus the major weakness associated with this law is addressed. This will make the law effective in addressing the urgent cyber security threats that can affect and damage the country in a major way. It will also ensure that the cyber criminals are not given the opportunity to launch more attacks. Works Cited “Cybersecurity Act of 2009 - S.773”. Web. 31 March, 2014. From http://thomas.loc.gov/cgi-bin/query/F?c111:1:./temp/~c111vLB6gx:e3115: Fox News. “Senate Bill Would Give President Emergency Control of Internet.” Fox News. Web. 31 March, 2014. From http://www.foxnews.com/politics/2009/08/28/senate-president-emergency-control-internet/ Guillaume, Fortinet. “Fighting Cybercrime: Technical, Juridical and Ethical Challenges.” Virus Bulletin Conference, 2009 . print. Kaplan, Jeremy. “New Cybersecurity Act Eliminates Internet Kill Switch.” Fox News, March 18, 2010. Web. 31 March, 2014. From http://www.foxnews.com/tech/2010/03/18/obama-no-longer-internet-president/ Lorber, Janie. “House Passes Cybersecurity Bill.” The New York Times, February 4, 2010. Web. 31 March, 2014. From http://thecaucus.blogs.nytimes.com/2010/02/04/house-passes-cybersecurity-bill/?_php=true&_type=blogs&_r=0 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“1) Adapting existing law to reflect the new realities of the Internet Essay”, n.d.)
1) Adapting existing law to reflect the new realities of the Internet Essay. Retrieved from https://studentshare.org/journalism-communication/1636702-1-adapting-existing-law-to-reflect-the-new-realities-of-the-internet-sometimes-works-and-sometimes-does-not-by-considering-what-we-might-consider-internet-crimes-which-are-directed-against-computers-and-computer-related-devices-and-telecommunicati
(1) Adapting Existing Law to Reflect the New Realities of the Internet Essay)
1) Adapting Existing Law to Reflect the New Realities of the Internet Essay. https://studentshare.org/journalism-communication/1636702-1-adapting-existing-law-to-reflect-the-new-realities-of-the-internet-sometimes-works-and-sometimes-does-not-by-considering-what-we-might-consider-internet-crimes-which-are-directed-against-computers-and-computer-related-devices-and-telecommunicati.
“1) Adapting Existing Law to Reflect the New Realities of the Internet Essay”, n.d. https://studentshare.org/journalism-communication/1636702-1-adapting-existing-law-to-reflect-the-new-realities-of-the-internet-sometimes-works-and-sometimes-does-not-by-considering-what-we-might-consider-internet-crimes-which-are-directed-against-computers-and-computer-related-devices-and-telecommunicati.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Suitability of Cybercrime Laws to Meet New Realities of the Internet

Constitutional Challenges Associated With Investigating Cybercrimes

However, these developments have presented the world with new types of threats that can potentially compromise security, privacy, and safety of the internet users.... Also, cybercrimes are defined as the criminal acts or offences which are committed against groups of individuals or individuals with a criminal intentions aimed at harming the reputation and status of the victims or to cause mental or physical harm to the victim either indirectly or directly, through the use of modern networks of telecommunications such as the mobile phones and the internet....
10 Pages (2500 words) Term Paper

A Short Course in International Payment

Documentary credits may be standard or special depending on what will meet the needs of the transacting parties—buyer, seller, bank of the buyer, and bank of the seller.... However, the governing laws are not the same.... The paper "A Short Course in International Payment" states that for international transactions, buyers and sellers approach their banks, which will, in turn, undertake a written agreement for the buyer that promises to pay a specific currency value in favour of the seller on the condition....
25 Pages (6250 words) Essay

Cybercrime - Illegitimate Use of Internet

The advancement in the field of the internet has developed a virtual environment where activities can be executed through networked computers.... ybercrime poses problems to both computers user and network users by making the use of the internet unsafe in various capacities.... As the paper "Cybercrime - Illegitimate Use of Internet" tells, computer technologies and the internet have become essential elements in the day-to-day life of individuals....
9 Pages (2250 words) Research Paper

Cybercrime and Digital Evidence

Nonetheless, the internet users must adopt and apply all the necessary cyber privacy policies.... Terrorists may use the internet platform to recruit members and plan their terror acts, while the sexual predators are likely to use social media sites to lure potential victims.... Therefore, the inability of laws to keep the pace with advancement in computer technology will lead to many cybercrimes unpunished regardless the increase in these criminal actions....
3 Pages (750 words) Assignment

Evolution of Cybercrime

The paper "Evolution of cybercrime" states that generally speaking, if there was a law that only dealt with identity theft as it is the most rampant then it would be easier for the law enforcement agency to deal with, address, and prevent such crimes.... The number is bound to rise with the rapid advance of technology and the government trying to keep up with new trends that are created almost every day.... The essay provides an introduction to identifying cybercrime and explains how it has evolved over time....
14 Pages (3500 words) Assignment

Cybercrime and Privacy

Although the law enforcement agencies have enacted several policies and set up legal departments to track and prohibit malicious use of the internet by the cybercriminals, there is still a serious lack of effective resources and infrastructure to dissuade cybercriminals from engaging in such crimes (Wall, 2007).... Laws planned for the censorship of the internet has been rejected and ineffective.... the internet-related crimes are fast spreading across the globe and have become transnational in nature, transcending beyond geographical boundaries, thus making it far more difficult to restrict, prevent, or investigate such occurrences and persecute the perpetrators....
5 Pages (1250 words) Term Paper

The Problem of Cybercrime Globally

the internet serves as the primary tool for conducting cybercrimes.... In this case, fighting cybercrime calls for well-informed policies and laws to reduce the impacts of such a crime on economic, social, and political arenas.... "The Problem of cybercrime Globally" paper contains a comparison and contrast between laws and policies of cybercrime in Saudi Arabia and Australia.... eparated from doctrine tied to territorial jurisdictions, new and effective legislations will emerge, in a variety of online channels to deal with a wide range of new challenges of cybercrime that has no specific parallel in the real world....
5 Pages (1250 words) Coursework

Risks of Expanded Businesses in Size and Globally

Such risks often relate to differences associated with laws, currency, and culture (International Monetary Fund, 2002, 254).... "Risks of Expanded Businesses in Size and Globally" paper argues that risks associated with cybercrimes continue to siphon money from most business entities....
13 Pages (3250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us