9 Oct 2022

107

Cyber Security Laws and Human Rights

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 888

Pages: 3

Downloads: 0

The components of cyber security and stability are premised on the malicious attacks that targeted Sony Entertainment Pictures Systems in the US. It is apparently clear that technology which had for a long period provided the much needed efficiency and business growth was under attack. Attackers in the form of petty criminals, hackers, business competitors and any other entity with malicious interests threatening the security of the cyber space in a broad spectrum. As highlighted in the paper, it is precisely vivid that attacks on the cyber space use a number of tactics to endanger the wellbeing of cyber space. Some of the methods include; computer viruses and worms, identity theft, phishing, and data breaches among other forms of cybercrime; the list is endless; the consequences are dire. The most intriguing aspect of cyber security issues is that tens of thousands of virus are in existence in the contemporary world while more than 370 million internet users are in the threat if being attacked by attackers. The numbers are ever increasing and the threats are real. As a result, it is imperative for stakeholders in the field to come up with a standardized and harmonized definition of cyber security that is internationally acceptable. It is by taking the war against cybercrime to higher grounds that attackers will be defeated and that takes an international consensus on what cyber security entails. 

The available definitions of cyber security seem to be similar but as highlighted earlier from the paper, it is clear that stakeholders in the cyber world should seek to come together and have a commonly derived definition that will help all the facets in the cyber space deal with the challenge with a common purpose. A synchronized definition of cyber security confirms that it entails all the processes and mechanisms that seek to protect the cyber domain from attackers in all acts of computer technology from harming the instituted networks and infrastructures. As a matter of fact, the paper asserts that the biggest challenge of cyber security is the fact that the term is used to refer to a chain of technical challenges that affect the cyber world; it is a generalized term. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

From the paper, it can be noted that cyber security is substantially important issue in the contemporary society both in the national and international scales. The reason as to why cyber security is considered a significant issue is because scores of studies especially from the Intelligence department ranks it as the leading threat to national security in the United States of America. Since the US is among the leading nation in the harmonization of global affairs, it contributes much to the making of globalization hence the threat to its national security by cybercrimes is a threat to the international security. It is surprising how the threat to the stability of the cyber space is threatening local business, international corporations and government agencies leading to heightened costs of maintenance of cyber world components and infrastructure. It is estimated that in the next one year, the cost of maintaining the cyber space security will augment significantly to about three trillion million shillings. This shows how serious the challenge. 

As a result of a common consensus that cyber security is a challenging issue that needs a combined effort in dealing with it, the government and other related authorities including the private world have advocated for a common and coordinated approach for dealing with the menace. It is as a result that various cyber security policies, laws and regulations have been enacted for the sole purpose of curbing the problem. However, the endeavor has contributed to an increased level of tension and disagreements between the government and the human rights lobbyists on how personal information should be handled. Human rights activists feel that the government is collaborating with the private sector to make individual information sharable thus leading to the breach of human rights. There is no any identified method of handling private information with the current cyber security legislations. It is factual that the cyber security legislations available currently seek to protect internet users from cybercrimes but on the other hand, they lead to the breach of individual rights such as the freedom of expression, the right to privacy and in a broad scale, the right to the access of information. Not only the US but many nations are struggling to come into terms with the dilemma between implementing cyber security regulations and the threat to human rights. 

It is factual that cyber security laws proposed by many nations across the globe are essential as they effectively help regulate and prevent cyber threats and crimes that are prevalent to many internet uses. Secondly, cyber security regulations help protect national interests and international security from attackers thus making them an essential component of regulating the internet world. However, there are various challenges associated with them that need an immediate action. For instance, there needs to be a common definition of cyber security to avoid instances of conflict of interest in the cyber space. Moreover, there needs to be a standardized form of regulations that regulated the global sphere because internet is borderless and the advent of globalization brings diverse people and nations together. Most of cyber security regulations infringe human rights hence require a universal code of regulating cyber security 

In conclusion, the paper confirms that cyber security regulations are essential for preventing the challenges that are currently experienced in the cyber world. However, in the process of instituting these regulations, there must be consideration of human rights aspects such as freedom of expression, the right to access of information and the right to privacy. An international approach to the issue is recommended. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Cyber Security Laws and Human Rights.
https://studybounty.com/cyber-security-laws-and-human-rights-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
English

The Downfalls of Oedipus and Othello

The Downfalls of Oedipus and Othello The downfall of great men in literature appears to follow dramatic events either forged by the author as the will of the gods or the consequence of their actions. Whether the...

Words: 1402

Pages: 5

Views: 477

17 Sep 2023
English

Why I Want To Become a Physician

A physician is a person who practices medicine dealing with treating illnesses, promoting and maintaining better health status through research and diagnosis. I want to become a physician for several reasons which...

Words: 270

Pages: 1

Views: 86

17 Sep 2023
English

The Perception of Death in the Play "Everyman"

Introduction Death is evident in the play Everyman in multiple perspective and the author describes it in different scenes. Thesis: The essay examines the perception of death in the play and how it influences...

Words: 1464

Pages: 5

Views: 98

17 Sep 2023
English

How to Reverse Chronic Pain in 5 Simple Steps

Summary Chronic pains are becoming very common in modern days. They are often caused by injuries, illnesses, surgery, or accidents. Unlike the days in the past, more people are starting to experience these...

Words: 1075

Pages: 4

Views: 72

17 Sep 2023
English

“Boyz n the Hood” director and Auteur Theory paper

The Auteur Theory is a cinematic aspect that explains how the film director is the "author" of the film. The theory explains that artists who apply intense stylistic control over their craft use certain features like...

Words: 847

Pages: 3

Views: 97

17 Sep 2023
English

Free College and University Education in the United Kingdom

In following persuasive essay on whether the colleges and university education should be free, we focus on the following scholarly sources; Pike's journal (2005) that talks of ‘ the first and second generation...

Words: 690

Pages: 2

Views: 180

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration