Cybersecurity Act Of 2012

882 Words2 Pages

With the development of science and technology, the internet has become a part people’s lives. Hackers are not only threatening people’s own cyber security and privacy but also the United States’ economy, security and all citizens’ lives. On mid-November 2011, Russian hackers failed to attack a water plant in Illinois (Nakashima).Therefore, the Cybersecurity Act of 2012 was made. The Cybersecurity Act of 2012 is “a bill to enhance the security and resiliency of the cyber and communications infrastructure of the United States” (“S.2015”)The Cybersecurity Act of 2012 was the battle between the national security and personal privacy.In this paper I will lay out three different position people take on the issue about The Cybersecurity Act of 2012 .
People in general will be affected by The Cybersecurity Act of 2012 because it matters on personal privacy and national security Normal citizens like us will be really interested in this because that government could observe everything and there is no privacy for people.Government staffs like senators,representatives in the House, and even President Obama might be interested in this issue because they need to make a balance between supporters and opponents because it is a really controversial issue.People might want their privacy but things will get worse if hackers destroy all the defense of the nation security.Taxpayers will also be interested in this because they want to know how much they need to pay for this act to be actually carried out and how it is going to affect national economy and their benifits.My first position is in favor of passing the Cybersecurity Act which allow the government and company exchange information and prevent attacking prevent the hackers from destoorying...

... middle of paper ...

...out their own business might be affected.According to Stiennon, the Cybersecurity Act of 2012 will force “utility operators, banks, and earth resources companies to comply with frameworks based on outmoded asset and vulnerability methodologies will distract them from implementing threat based defenses” (Stiennon) which means this act might affect on the computer companies’ business, their own business privacy and the relationship with the users. The business people might pay more attention on the relationship with the users and the companies’ profit. If the users stop using anything relate to the internet filed, the computer companies’ business will have a hard time. People who have this view think this act is only taking both sides benefits away.It is wasting money and hurting both sides.
My last position is that a few people are holding the idea that the company

Open Document