11 April 2014
Cyber Threats on the Rise
Every day advances in technology happen. In the last few decades, computer technology has advanced past many technological barriers. Almost every aspect of everyone’s life has some dealing with computers in it. With all this being said, computer cyber threats are on a rise in every economy in the world. Cyber threats in America, have caused the government to try and control American internet access, have cost American’s a lot of money, and have everyone worried about the many infrastructures that are ran by the cyberspace, from being attacked.
With cyber threats on the rise, it has the government running around trying to find ways to stop it. They have tried to pass many bills, such as Cyber Intelligence Sharing and Protection Act (CISPA), in the United States of America. With the U.S. government being scared of cyber threats, they are trying to pass bills that would insure they could protect the citizens at their best abilities, but the bills, CISPA etc., impede on U.S. citizens’ rights. With all their attempts at creating safer infrastructures in the U.S., they believe it would need an entity to watch over the information flow, to make sure no one is trying to harm the infrastructures. “Cyber Intelligence Sharing and Protection Act allows for the government to interpret the law in such a number of degrees that any online communication or interaction could be suspect and thus unknowingly monitored… CISPA allows Internet Service Providers to “tunnel private communications and related information back to the government without adequate privacy protections and controls. The bill does not specify which agencies ISPs could disclose customer data to, but the structure and incentives in the bill raise a very real possibility that the National Security Agency or the DOD’s Cybercommand would be the primary recipient” (Arab News).
The main cyber threats around happen for financial...
Cited: Power, Richard “Hackers” PBS. WGBH educational foundation, 2001.
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/power.html 11 Apr
Please join StudyMode to read the full document