Computers were on the rise (being used more often), and so were computer crimes. How did Congress prosecute these criminals? They didn’t because couldn’t. The Computer Fraud and Abuse Act was the solution to intern... ... middle of paper ... ...4 2014. Dawson, Christian.
08 Dec. 2013. Holahan, Catherine. "The Dark Side of Web Anonymity." What Matters In America (2012): 218-221. "Is Cyberbullying a Serious Problem?"
Research Problem The problem this paper will endeavor to address is that of cyber security or the lack of it, characterized by the cybernation of our lives, which has increased our vulnerability to cyber-attacks. The scope of the threat posed by cyber insecurity will be addressed. How severe is threat posed by cyber criminals? How do they operate? The ramifications of cybercrimes and their impact on the economy are without a doubt cause for government.
The Internet presents various challenges in the realms of privacy and security. Such threats originate from obvious sources such as hackers and malware, but threats come from less obvious sources as well; employees, government agencies, and even one’s self through lack of knowledge or vigilance. Privacy, as explained by Lawrence Lessig (2006), “from the perspective of law, is the set of legal restrictions on the power of others to invade a protected space” (p.201). Cisco describes network security as the activities which protect a computer network to ensure “… the usability, reliability, integrity, and safety of your network and data” (n.d.). The two terms are closely related in Internet security, and as such, the threats outlined can be considered to have element of both privacy and security.
The many security risks that come with computers and technology scares many Americans to stray away from exploring this new horizon. Voting online in theory is appealing, but in practice is not realistic. Security issues and a social issue known as the “Digital Divide” provide major drawbacks to online voting, but the convenience and cheap cost can be sufficient enough to convince the United States otherwise. Security issues are the main setbacks when it comes to the topic of online voting. The Internet not only makes the average person’s life easier, but can also be abused if in the wrong hands.
Credit card companies’ refusal to accept that technology is moving too fast for them to keep up and their lack of security with existing accounts provides evidence that it is not the consumer’s fault that identity theft is one of the fastest growing crimes in the nation (Dole, 2005). Credit card companies blame consumers for being too gullible and forthcoming with their private information for many reasons (Shelly, 2010). Out of the six most common ways, that identit... ... middle of paper ... ..., less usable abroad. Retrieved February 22, 2011, from CreditCards.com: http://www.creditcards.com/credit-card-news/outdated-smart-card-chip-pin-1273.php Miller, J. (2008, January).
The Journal of Electronic Engineering. Retrieved April 25, 2014, from http://www.eejournal.com/archives/articles/20140415-heartbleed/ Lemos, R. (2014). 'Heartbleed' OpenSSL Flaw May Lead to Leaked Passwords, Encryption Keys. Eweek, 1. Retrieved April 22, 2014, from EBSCO The Heartbleed Bug.
(2013, January 14). Identity theft: the means, methods, and recourse. Retrieved from http://resources.infosecinstitute.com/identity-theft-means- methods-recourse/ Ellyatt, Holly. (2013, August 13). The threat from cybercrime?.
(2009).Crime Online: Cybercrime and illegal innovation. UK: Nesta. • Shaw E., (2013) How To Avoid Falling Victim To Online ID Fraudsters. The Independent [online]. Available at: [Accessed 21 May 2014].
Advanced Persistent threats and how to monitor and deter them. Network security, 2011(8), 16-19. Zetter, K. (2010). Google hack attack was ultra sophisticated, new details show. Wired Magazine, 14.