Why Are Cybercrime Laws Important?

Superior Essays
The internet has cyber laws that were put into place for the users to stay protected. This allows internet users access, privacy, freedom of expression, and jurisdiction. Cyber Laws are important because it incorporates all the activities concerning the internet. The article The Importance of Cyber Laws, one must Know Before Using Internet by Hector says that cyber laws are significant because they ensure that crimes are not encountered. Many people are not fully informed about these laws and how they affect us every time we decide to open up our internet browsers.
According to the article Increased Cyber Security Mandated by Comprehensive New Legislation by Gert Jan Schol, cyber threat has been increasing on all accounts. That is why we
…show more content…
There is a government website named Cybercrime Laws of the United States that list all the laws. Some laws mentioned include laws that prohibit online identify theft, hacking, intrusion into computer systems, etc. Do these laws actually affect us? No, these laws only affect you unless you are a victim that has fallen into any of these situations. Although I do believe that it is important to know these laws in case anything can happen. Cybercrimes can occur to anyone, especially now that there are so many opportunities for hackers since our cybersecurity is not where it should be. In an article written by Stephanie Condon called What Can Government Do to Improve Cyber Security, she mentioned that in the year 2015 nearly 22 million Americans had their personal information stolen. The article stated that due to all the hacking that has occurred, the Obama administration insist that they are taking steps to respond to the hacking and to lessen the risk of it occurring in the future. Fact Sheet: Cybersecurity National Action Plan by the Office Press Security of the White House explains that the President is directing his administration to execute a Cybersecurity National Action Plan that will put in place long-term strategy that is said to enhance cybersecurity awareness. This plan is also said to protect privacy, maintain public safety as well as economic and national security ultimately empowering …show more content…
The first step is to get educated on ways to protect yourself against hacking, phishing, etc. Step two is to understand the common tactics hackers use and step three is to secure your computers and digital assets. You can follow these steps in order to make sure that you stay safe from the criminals lurking around the internet. I hope after reading this paper you will take some steps to try and make your computer at home the safest you can and that you will be extra careful with putting your personal information out

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    President Obama recognizes this growing issue and made initiative to change it. “On February 12, 2013, President Obama signed Executive Order 13636, “Improving Critical Infrastructure Cybersecurity.” The Executive Order is designed to increase the level of core capabilities for our critical infrastructure to manage cyber risk” (Foreign Policy p.1). The main goal of Executive Order 13636 is to improve the United States posture on cyber security through information sharing, cybersecurity practices, and privacy.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Zunis Investments

    • 1339 Words
    • 6 Pages

    It is imperative that we have the proper systems in place to ensure that those attacks don’t take place and even if they do, there are little to no damages. As with any organizations playing on the global stage especially one in the financial services industry, policy is key. I will ensure that there is a creation of an enterprise risk organization, in addition to a risk manager embedded within all of Zunis business unit. Enterprise risk will ensure that there is a framework in place and policies to handles cyber security issues of every nature that may affect the company, there will be updates to the incident and reporting awareness policy, there will be updates to electronic application use policy, there will be quarterly training sessions for all employees to bring them up to speed on how to detect social engineering techniques and email phishing. I will ensure that Zunis works closely with public policy unit to lobby lawmakers on national cyber security policy in the various countries of operations.…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Unit 1 Assignment

    • 783 Words
    • 4 Pages

    COMPUTER ARCHITECTURE AND IMPLEMENTATION Assignment 1 Name: Bhargavi Bussu Student Id: 10000126759 Professor: Paul Wang 1.3 Traditionally a user's view of a Computer system like an Onion. Explain why this concept is outdated and draw a new diagram based on the concept proposed in this book. In Today's current generation the Computer systems are wide opened to the Internet, however threat towards the Computer system have been increasing rapidly at a faster rate.…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In today's society there are many laws that are made to help everyone be equal and neutral with what is to come from them and ones that people do not agree on are considered as unjust. As human beings we should be able do what we want and not have anyone else manage what we are doing or explain why they are managing them. We as people shouldn’t have to worry about how safe and secure our private information that makes up our life in this world that we do. We should be able to enjoy the internet without worrying about if our vital information being in the wrong place or at someone else’s disposal. Many laws today are considered unjust, but our privacy and cyber-privacy are big topics on how easily accessible it is for hackers and people in general…

    • 295 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Explain Why We Need Laws

    • 564 Words
    • 3 Pages

    These laws include: personal security laws; trespassing and other laws to protect personal property. There are also laws which limit how you can economical help other people, preventing insider trading. These laws help keep a stable government and economy, displaying one of the meaning reasons for why we need…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    These laws represent the essential framework for basic internet safety and laws are are important…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cyberattacks have become one of the biggest threats facing the United States today. Although Bill Clinton, George Bush, and President Obama have passed laws and put forward executive orders; cybercrime is still a prominent threat to our country. Obama further extended Bush’s Patriot Act through executive orders, improving the security to sixteen sectors by providing more in order to prevent future breaches and threats. Cybersecurity has become a prominent issue in politics and how our government reacts to cyber threats. The stakeholders from a political lens focus on how cybersecurity affects our government.…

    • 293 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Website Deacement Analysis

    • 1102 Words
    • 5 Pages

    I was introduced to a number of Internet based acts and laws that I did not know existed beforehand. The United States Patriot Act has allowed for the criminalization of knowingly sending and using dangerous codes while the Copyright and National Stolen Property Acts have developed to allow over forty states to criminally charge any individual who commits some kind of fraud. Special task forces have been tracking down cybercriminals since the issue became an epidemic. Since its creation, Electronic Crimes Task Forces have charged criminals a total of $1 billion dollars for the cybercrimes they have committed (Seigel, 2014, 548). There are even committees designed to combat cybercrimes.…

    • 1102 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    In recent years, Cyber-attacks have become a more common form of terrorism used against the United States. Cyber-terrorist have the ability to access bank accounts, shut down systems, and send malicious viruses to ordinary citizens from the comfort of their home. It may be possible for terrorist to hack into States and Federal systems, which would be catastrophic on a global level; cyber-attacks are happening more and more often than they should. This type of cybercriminals has cost the US 580,000 jobs and $100 billion, with the global cost as much as $400 billion (2013). The legal field have been targeted by cybercriminals, the sensitive data about their clients have created a gold mine for the cybercriminals, and in an effort…

    • 1394 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays