Topic > The Information Age and Cyber ​​Crimes

The introduction of the Internet has brought us into a completely new era: the Information Age. The information age is also known as the computer age or digital age. The digital age is a period in which human history shifts from traditional industry to an information technology-based economy. Undeniably, the Internet has brought us benefits in the fields of business, science, education and others. But the Internet, just like any other human invention, is a double-edged sword. The Internet allows us to obtain information with a single touch and share data almost instantaneously, but it also opens the door to crime. The Internet has created several new forms of crimes and made it easier to commit old crimes. Examples of cyber crimes are cyber-stalking, identity theft, child pornography, copyright violations, hacking, fraud, and scams. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay The growth of information has given rise to cyber crimes and caused huge losses. Due to the impact of digitalization on the financial sector, healthcare, small and medium-sized businesses and other sectors, data breaches have gained increased attention. Even with advanced countermeasures and consumer awareness, cybercrimes continue to increase. This is mainly due to criminals finding smarter ways to install disruptive viruses, steal intellectual property, commit identity theft, access financial information, and shut down company computer systems. In 2016, we saw the largest data breach to date in US history of 1,093 million, with nearly 36.6 million records exposed when online platform Yahoo revealed that hackers stole user data and information relating to at least 500 million accounts. in 2014. The Department of Justice classified cybercrime into three types. First, there are criminals who target computers. These crimes could be data theft, hardware theft, or virus installation. Computers are used as a weapon to commit crimes. Criminals use computers to commit many traditional crimes and get away with it due to its unique nature that transcends national borders and anonymity. Apart from these, computers are also used as legal accessories to store compromising information. Cybercrime involves both software and hardware. In 2003, the Container Security Initiative (CSI) conducted a survey with the participation of the Computer Intrusion Squad of the Federal Bureau of Investigation in San Francisco. The 530 respondents who participated in the survey are from US companies, government agencies and financial institutions, and 56% of them reported unauthorized use of their IT systems. Symantec, a leading security service, estimates that direct crime has caused businesses to lose $114 billion annually, while the cost of recovering from cybercrime is $274 billion.[3] The costs of cybercrime have exceeded the costs caused by the sale of drugs on the black market. It is an unavoidable risk that all computer and technology users face. This is because brilliant computer skills can no longer characterize cybercriminals as even children can download online hacking tools and use them easily. The question that has arisen is whether there are laws that can deal with cyber crimes? Probably, the privacy systemof the United States is the oldest and most effective in the world. The US privacy system relies more on post hoc government enforcement and private litigation. The U.S. government believes computer system security is important for two reasons. The first reason is that the growing role of information technology and the growth of the e-commerce sector have made cybersecurity an essential component of the economy. The next reason is that cybersecurity is vital to the operation of safety-critical systems for the protection of infrastructure systems. Critical infrastructure is defined in Section 5195C of the United States Code as systems and assets, physical or virtual, so vital to the United States that the failure or destruction of such asset systems would lead to a devastating impact on security, safety national economy, national public security. health or safety. The three major cybersecurity regulations of the US federal government are the Health Insurance Portability and Accountability Act (HIPPA) of 1996, the Gramm-Leach-Bliley Act of 1999, and the Homeland Security Act of 2002 which included the Federal Information Security Management Act (FISMA). These regulations require healthcare organizations, federal agencies, and financial institutions to protect their systems and information. However, these three regulations are not foolproof in protecting systems and information as they do not specify which cybersecurity methods must be implemented and only require a reasonable level of security. For example, FISMA, which applies to every government agency, requires only the development and implementation of mandatory information security policies, standards, principles and guidelines. However, these regulations do not affect many computer-related industries such as Internet service providers and software companies. Furthermore, the language of the three main regulations is too vague and leaves much room for interpretation. Bruce Schneier, the founder of Cupertino's Counterpane Internet Security, says a company won't make sufficient investments in cybersecurity unless the government forces it to. The effort to strengthen cybersecurity laws has never stopped. Recently, the federal government is introducing several new cybersecurity laws and amending existing cybersecurity laws for a better security ecosystem. The Cybersecurity Information Sharing Act (CISA) was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate on October 27, 2015. Its goal is to improve cybersecurity in the United States through increased threat intelligence sharing to IT security. and for other purposes. The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The National Cybersecurity Protection Advancement Act of 2015 amends the Homeland Security Act of 2002 to allow the Department of Security's National Cybersecurity and Communications Security Integration Center to include tribal governments, information sharing, and private entities among its non-federal representatives . The purpose of cybersecurity regulation is to force companies and organizations to protect their systems and information from cyber attacks such as viruses, phishing, denial of service attacks, unauthorized access and attacks on control systems. In addition to the federal government, attempts have been made by state governments to improve cybersecurity by increasing the public visibility of companies with.