-
Essay / The Information Age and Cybercrime
The introduction of the Internet has brought us into a whole new era which is the information age. The information age is also known as the computer age or the digital age. The digital age is a period in which human history is transitioning from traditional industry to an information technology-based economy. Undeniably, the Internet has brought us benefits in business, science, education and others. But the Internet, like any other human invention, is a double-edged sword. The Internet allows us to obtain information at the click of a button and share data almost instantly, but it also opens the door wide to crime. The Internet has created many new forms of crime and made old crimes easier to commit. Examples of cybercrime are cyberstalking, identity theft, child pornography, copyright violations, hacking, fraud and scams. Say no to plagiarism. Get Custom Essay on “Why Violent Video Games Should Not Be Banned”?Get Original EssayThe growth of information has given rise to cybercrimes and caused huge losses. Due to the impact of digitalization on finance, healthcare, small and medium-sized businesses and other sectors, data breaches have gained more attention. Even though advanced countermeasures and consumer awareness are applied, cybercrime continues to increase. This is mainly because criminals are finding smarter ways to install disruptive viruses, steal intellectual property, commit identity theft, access financial information and shut down computer systems. business. In 2016, we witnessed the largest data breach to date in US history at 1,093 million, with nearly 36.6 million records exposed. Online platform Yahoo has revealed that hackers stole user data and information linked to at least 500 million accounts. in 2014. The Ministry of Justice classified cybercrime into three types. First, there are criminals who target the computer. These crimes could be data theft, hardware theft or planting viruses. Computers are used as a weapon to commit crimes. Criminals use computers to commit many traditional crimes and get away with impunity due to their unique nature that transcends national borders and anonymity. In addition to this, computers are also used as legal props to store incriminating information. Computer crime involves both software and hardware. In 2003, an investigation was conducted by the Container Security Initiative (CSI) with the participation of the Computer Intrusion Squad of the Federal Bureau of Investigation in San Francisco. The 530 respondents who participated in the survey are comprised of U.S. businesses, government agencies and financial institutions and 56% of them reported unauthorized use of their IT systems. Symantec, a leading security service, estimates that direct crimes have caused businesses to lose $114 billion annually, while the cost of recovering from cybercrimes is $274 billion.[3] The costs of cybercrime have exceeded the costs of selling drugs on the black market. This is an unavoidable risk that all computer and technology users face. Indeed, brilliantComputer skills can no longer characterize computer criminals, since children can also download hacking tools online and use them easily. The question that arises is whether there are laws to combat computer crimes? The American privacy system is arguably the oldest and most effective in the world. The American privacy system relies more on post hoc government action and private litigation. The United States government believes that the security of computer systems is important for two reasons. The first reason is that the increased role of information technology and the growth of the e-commerce sector have made cybersecurity an essential component of the economy. The next reason is that cybersecurity is vital for the operation of critical systems for the security and protection of infrastructure systems. Critical infrastructure is defined in Section 5195C of the United States Code as systems and assets, physical or virtual, so vital to the United States that the incapacity or destruction of those asset systems would result in a devastating impact on security, national economic security, national public. health or safety. The United States federal government's three main cybersecurity regulations are the Health Insurance Portability and Accountability Act (HIPPA) of 1996, the Gramm-Leach-Bliley Act of 1999, and the Homeland Security Act of 2002, which included the Federal Information Security Management Act (FISMA). These regulations require healthcare facilities, federal agencies, and financial institutions to protect their systems and information. But these three regulations are not foolproof for securing systems and information because they do not specify which cybersecurity methods should be implemented and only require a reasonable level of security. As an example, FISMA, which applies to every government agency, only requires the development and implementation of mandatory information security policies, standards, principles and guidelines. However, these regulations do not apply to many IT-related industries such as Internet service providers and software companies. Additionally, the language in the three main regulations is too vague and leaves a lot of room for interpretation. Bruce Schneier, founder of Counterpane Internet Security in Cupertino, says a company won't invest enough in cybersecurity unless the government forces it to. Efforts to strengthen cybersecurity laws have never stopped. Recently, the federal government has introduced several new cybersecurity laws and amended existing cybersecurity laws for a better security ecosystem. The Cybersecurity Information Sharing Act (CISA) was introduced in the United States Senate on July 10, 2014 and passed in the Senate on October 27, 2015. Its goal is to improve cybersecurity in the United States through increased information sharing on cybersecurity threats. and for other purposes. The law allows information about Internet traffic to be shared between the United States government and technology and manufacturing companies. The National Cybersecurity Protection Advancement Act of 2015 amends the Homeland Security Act of 2002 to allow the Department of Security's National Cybersecurity and Communications Integration Center to include tribal governments, information sharing, and private entities among its non-federal representatives. The objective of cybersecurity regulations is to..