Why Are Cybercrime Laws Important?

Superior Essays
The internet has cyber laws that were put into place for the users to stay protected. This allows internet users access, privacy, freedom of expression, and jurisdiction. Cyber Laws are important because it incorporates all the activities concerning the internet. The article The Importance of Cyber Laws, one must Know Before Using Internet by Hector says that cyber laws are significant because they ensure that crimes are not encountered. Many people are not fully informed about these laws and how they affect us every time we decide to open up our internet browsers.
According to the article Increased Cyber Security Mandated by Comprehensive New Legislation by Gert Jan Schol, cyber threat has been increasing on all accounts. That is why we
…show more content…
There is a government website named Cybercrime Laws of the United States that list all the laws. Some laws mentioned include laws that prohibit online identify theft, hacking, intrusion into computer systems, etc. Do these laws actually affect us? No, these laws only affect you unless you are a victim that has fallen into any of these situations. Although I do believe that it is important to know these laws in case anything can happen. Cybercrimes can occur to anyone, especially now that there are so many opportunities for hackers since our cybersecurity is not where it should be. In an article written by Stephanie Condon called What Can Government Do to Improve Cyber Security, she mentioned that in the year 2015 nearly 22 million Americans had their personal information stolen. The article stated that due to all the hacking that has occurred, the Obama administration insist that they are taking steps to respond to the hacking and to lessen the risk of it occurring in the future. Fact Sheet: Cybersecurity National Action Plan by the Office Press Security of the White House explains that the President is directing his administration to execute a Cybersecurity National Action Plan that will put in place long-term strategy that is said to enhance cybersecurity awareness. This plan is also said to protect privacy, maintain public safety as well as economic and national security ultimately empowering …show more content…
The first step is to get educated on ways to protect yourself against hacking, phishing, etc. Step two is to understand the common tactics hackers use and step three is to secure your computers and digital assets. You can follow these steps in order to make sure that you stay safe from the criminals lurking around the internet. I hope after reading this paper you will take some steps to try and make your computer at home the safest you can and that you will be extra careful with putting your personal information out

Related Documents

  • Improved Essays

    Wisdom is supreme; therefore get wisdom. Though it cost all you have, get understanding” (New International Version). Therefore, it is imperative that one is fervently aware of the intrusions that can occur online. Internet users must take preventive measures against surveillance and online hackers. Thus, each individual must take the time to set up a computer firewall, antivirus software and security settings for each personal computer, social media site and email subscription they have.…

    • 1466 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    8). Throughout the article, the FBI author keeps that tone to show how serious he/she is, but yet in a friendly manner, the author wants to keep the audience safe. By reading this, the audience will know how serious the cyber-attacks are, and how they always need to protect their computer. Logos helps a lot on how the reader will take in the information. Ethos, pathos, and logos really do make the FBI webpage very effective on the readers.…

    • 869 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Nowadays we hear the word “cybersecurity” a lot but do you ever wonder what does it really mean? According to the department of homeland security, “Cybersecurity is general Internet safety, which includes protection of anything connected to or accessible by the Internet- from networks themselves to the information stored in computers.” The University of Maryland University College defines cybersecurity as a measure that protects our computers, networks, programs and data from unintended or unauthorized access, change or destruction.” You can also think of cybersecurity as a fence that keeps others from manipulating the confidentiality, integrity or the availability of your information without your consent. In the past 25 years, technology has…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance. To begin, if the government were to force companies to reveal secured information, it would lead to further unwarranted or corrupt information gathering. There is no way for Apple to completely restrict the software so it would…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The purpose is solely to gain information about the target and no data is changed on the target. Some types of passive threats: Traffic analysis: This is monitoring internet traffic to build data on who is visiting what website this could be used to lead the user to a malicious website which could make them give out sensitive information to prevent this, the users could use a virtual private network which will prevent the intruder from tracing the user. Encryption: Intercepting encrypted information flows and trying to break the encryption this could be harmful to a business as it could allow corporate information to be compromised to prevent companies to make sure to use secure connections to send information and view that is connected to that secure connection. Tapping: Monitoring unencrypted communications such as emails or telephone calls this could be dangerous when sensitive information is being sent over an unsecure connection to prevent this use trusted websites and a secure…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    I will pass policies that show employees how to construct strong passwords to log in to the system such as P0c0nt@s2132, in which shows not only letters but upper case, symbols, and numbers. As well as, a secret question and password must be provided to provide reassurance that the person logging in is who they say they are. Next would be to have the right and updated anti-virus and malware protections. This will help detect threats that enter the system. Locking your network and applying wired networks, which involves plugging into physical outlets or hacking modem ports.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    People should themselves beware and should take steps to ensure that their personal information is not used in a way which might leak the same, and facilitate it for those cyber criminals to use up this personal information to get their way (profit from someone else’s works). MEASURES TO DEAL WITH CYBER CRIMES  Role of INTERPOL INTERPOL has committed itself to fight against Cyber Crimes. Most of these crimes are Trans-National in character, which is the reason why INTERPOL can deal with them more effectively and is capable of investigating crimes like these on a Corporate Level. INTERPOL has uniquely advanced itself to the fight against cybercrimes on a global level by its proactive research into these emerging crimes. INTERPOL’s main initiatives on Cyber Crimes focus on: • Digital Forensics • National Cyber Reviews • Research and…

    • 1817 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    However, the hackers are always a step ahead of us. Is there a way to stop the hackers? Cybersecurity, as known as Computer Security, is the “method of protecting information, computer programs, and other computer system assets (“Computer Security”).” However, today is not only computers. According to my friend, Alex Cormier, who works at MassMutual in their IT department, all electronics are vulnerable to attacks. “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”.…

    • 1115 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Privacy And Security

    • 1243 Words
    • 5 Pages

    Other companies, such as Bank of America, American Express and Amazon, began using encryption on their website to protect information transferred between the company and the user, minimizing the threat that user data will be seized by hackers (Soghoian 374-375). Using a series of mathematical operations and algorithms, users can protect their data (Saitta). These algorithms are created through processes such as passwords, which are often created through a device or program user. Each password is individualistic and cannot be easily hacked through hacking software as a result of their unique nature (CGP Grey, “Should all locks have keys? Phones, Castles, Encryption, and You).…

    • 1243 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Firewall Vs Firewall

    • 1167 Words
    • 5 Pages

    A firewall acts the role of a security guard on your computer. It is the first step to protecting your PC as it blocks unknown programs from entering the computer through the internet. There are two types of firewalls that could be installed in a computer, a software firewall, and a hardware firewall. These two safety nets serve a similar purpose of protecting the PC but in a different way. The software firewall is an application installed so as to perform its task while a hardware firewall is a device connected to the computer.…

    • 1167 Words
    • 5 Pages
    Improved Essays