The Pros And Cons Of Cybercrime

Superior Essays
Register to read the introduction… However, congress has been making strides in the right direction over the past few years. As of now most code is protected under the first amendment's free speech clause; meaning the writing of malicious code is protected. The use of such code is not protected under the first amendment and is a felony. However “it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce. Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.” (WGBH educational foundation) However, the odds of finding the creator of the malicious code are slim, making this penalty almost obsolete. Identify theft is protected under the Identity Theft and Assumption Deterrence Act but only discusses punishment of the violator. This is another law that does not clearly prohibit cybercrime. “It criminalizes identity theft and allows courts to assess the losses suffered by individual consumers” which does not specify the form in which identity theft must take place. Laws prohibiting and punishing cybercrimes are less effective when the root of the problem cannot be tracked. For as controversial as the topic is, there may not be laws in effect fully prohibiting cybercrimes to a full …show more content…
Department of Homeland Security, 6 Jan. 2016. Web. 24 Apr. 2016.
"Foreign Policy Cyber Security." The White House. The White House. Web. 24 Apr. 2016.
"Implement a Cybersecurity Plan | StaySafeOnline.org." Implement a Cybersecurity Plan | StaySafeOnline.org. National Cyber Security Alliance, n.d. Web. 25 Apr. 2016.
Shannon, Greg, and Tim Polk. "National Challenges and Goals for Cybersecurity Science and Technology." The White House. The White House, 09 Feb. 2016. Web. 24 Apr. 2016.
"The 9 Biggest Data Hackers Of All Time." Huffpost Tech. Ed. Lorenzo Ligato. The Huffington Post, 20 Aug. 2015. Web. 24 Apr. 2016.
WGBH Educational Foundation. "Who's Responsible? - Computer Crime Laws." PBS. PBS. Web. 24 Apr. 2016.
Shipley, Lou. "You Can Prevent a 'Panama Papers' Scandal at Your Law Firm." The Huffington Post. TheHuffingtonPost.com, n.d. Web. 03 May 2016.
"Hacker Hat Colors Explained: Black Hats, White Hats, and Gray Hats." HowTo Geek RSS. HowTo Geek, n.d. Web. 04 May

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Brilliant Essays

    Risk Assessment: Pinellas County Schools Evelyn Davis November 22, 2015 University of Maryland University College EXECUTIVE SUMMARY Pinellas County Schools is the seventh-largest in the state of Florida. The creation of Pinellas County Schools came to be after a split in 1912 from Hillsborough County. Pinellas County serves 150 schools including magnets schools, career academies, adult education centers and a virtual school program. Pinellas County Schools with the help of 7000 plus educators offers families a wealth of educational possibilities well-matched to students’ interests, talents, and abilities. Pinellas County Schools collect and maintain data on students, faculty and staff who work within the school district.…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The ability of the homeland security system to assess and respond to future threats can at times be uncertain. This is due to the ever evolving nature of the threats posed to the country. As new threats are addressed more is learned about resources are needed for each type of manmade or natural event. Since, September 11, 2001 many steps have been taken to address this country’s vulnerability to terrorist attacks and Hurricane Katrina demonstrated the need for improvements in the country’s ability to respond to natural or mass casualty disasters. The Department of Homeland Security was created to assess these threats and establish procedures to improve the resiliency of the country.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    National Security Agency

    • 1122 Words
    • 5 Pages

    information systems. Also, NSA has become the lead agency responsible for monitoring and protecting all the federal government’s computer networks from acts of cyberterrorism. Therefore, NSA agents are responsible for detecting and exploiting weakness in an oppositional country’s computerized secret coding systems. The NSA’s function in protecting classified computer data demands an eclectic mix of agents who specialize in a wide range of professional fields, including researchers, computer scientists, mathematicians, and…

    • 1122 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity In America

    • 899 Words
    • 4 Pages

    Individuals question what kind of response a 200-year-old government can provide to modern-day threats. Some believe that even if Congress had the ability to adopt a utopian cybersecurity law, it would be short lived because of the endlessly evolving nature of cyberspace. Those who support private sector cybersecurity also arguing that breaches only happen because their networks are consistently being attacked. Furthermore, economic experts believe if the government enacts legislation, many of the cybersecurity professionals would leave America to seek employment in other countries (Clinton, 1).…

    • 899 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cyc3704 Assignment 1

    • 723 Words
    • 3 Pages

    All required textbooks are listed and available for download on the course Syllabus. Information Security for Non-Technical Managers, E. Gelbstein (2013), pp. 12-71. Internet and Technology Law: A U.S. Perspective, K. G. Kustron (2015), pp.…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays