Essay Help: Brainstorming Techniques

The White House sought to establish a National Cybersecurity Commission that would be composed of security experts from both the public and private commission. This commission would be mandated to lead the way in investigating, detecting and offering recommendations regarding all forms of possible attacks. The commission was also supposed to foster and discover better and more viable solutions. In addition, the Cybersecurity commission would be expected to modernize government IT according to the proposals of the White House. Another approach of the White House was to educate American citizens to be more careful when using their online accounts (Eastton & Taylor, 2011). The White House also recommended additional investment into the Cybersecurity kitty.

In regards to the receipt of threats related to cyber, policies and procedures should be created by the President according to the proposals of the House. Thereafter, the Congress should be allowed to debate and pass resolutions on all the forwarded threat indicators. On the other hand, heads of relevant agencies should work with the Attorney General before submitting any findings to the Congress according to the proposals of the Senate (Fischer, 2013).

One of the areas of cyber laws that seem to be moving forward is inclusive sharing of threats related to cyber space. As it stands now, private entities can swiftly boost their security levels by accessing vital information from the government and other private organs. Information sharing on all possible threats and attacks has been a major gain in the fight against cyber-related threats (Jaishankar, 2011). Second, both private and federal agencies have significantly embraced and deployed threat detection and prevention measures (Fischer, 2013). Second, there have been positive moves in research and development of Cybersecurity. Apart from just providing surplus funds, the Federal government has recruited, trained and equipped more personnel to assist in handling emerging threats (Eastton & Taylor, 2011). New threats have been identified through the help of the on-going research and development.

Public awareness and sensitization programs on cyberspace security have also been in the right direction. As it stands now, most individuals are now keener on how to protect themselves against online fraudsters. The ability to safeguard individual online accounts is a major gain as far as Cybersecurity is concerned (Bowker, 2012).

The future of cyber law presents myriads of challenges that should be tackled with a lot of sobriety. For instance, it is apparent that cyber crimes will continue to be more sophisticated with the passage of time. As financial cybercrime grows more complicated and difficult to track down, governments will be compelled to be very dynamic in the development of effective cyber laws and online fraud prevention measures. Besides, cyber laws will probably demand mandatory laptop encryption in order to boost security measures. New equipments will also be pre-installed with clients’ data especially among organizations that store private information for their users (Eastton & Taylor, 2011).

Cyber laws are also expected to be made universal across the board regardless of location (Whitman & Mattord, 2011). Since cyber crimes usually go viral and cover large distances within a short time, governments will be compelled to institute more effective collaboration in order to deal with the sporadic cases of cyber threats (Fischer, 2013). Moreover, cyber laws that will be enacted in future will be more stringent to deter both old and emerging criminals. .

Find this article useful? Share with friends!
samples /testimonials
Order NOW! Hesitating?
Copyright © 2006-2017 Prowriterz.com. All Rights Reserved.