5 Sep 2022

94

The Cyber-Security Information Sharing Act (CISA)

Format: APA

Academic level: College

Paper type: Coursework

Words: 550

Pages: 1

Downloads: 0

The Cyber Crime bill presents a logical way of addressing privacy and security concerns in the networks. While the bill seeks to increase computer security among supporters, detractors believe that the law’s interest is expanding the government’s surveillance that undermines individual privacy. The Cyber-security Information Sharing Act (CISA) seeks to protect Internet users against loss of personal information and counter cyber-attacks. Critics against the bill insist that the legislation seeks to enhance public surveillance, which is contrary to the concept of providing security. I believe CISA provides a legal framework that allows public and private firms to share sensitive information on cyber-security threats that can enhance security and ensure individuals’ privacy.

CISA prompts the government and private sector to share information for the objective of creating a formidable security system to enhance cyber-security. The country requires a meaningful system of reducing cyber-attacks and other security vulnerabilities by sharing sensitive data that can enhance the collection of intelligence (Moreno et al., 2016). Likewise, the process uses an evidence-based approach to gather critical information into an analytical system that can predict and prevent cybercrime. Countries without cyber laws are encountering high levels of cyber-attacks that result in loss of sensitive corporate data that includes loss of finances and assets. Sharing of information is done under a strict code that is determined by the legal authorities, which reduces the chances of infringing on privacy rights. Therefore, CISA seeks to enhance the sharing of data between government firms and the private sector through a legal system that limits spying.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

CISA has put in place critical mechanisms of limiting liability and reducing disclosure of private information, which guarantees proper protection of critical personal data. The bill intends to monitor cyber threat indicators that include identifying users who engage in suspicious and malicious activities and finding out the methods by which they exploit security vulnerabilities to obtain private information (Moreno et al., 2016). Likewise, the approach ensures that government and private firms come up with defensive measures to block users who engage in suspicious activities. Moreover, information is shared in a DHS-sanctioned method that reduces vulnerabilities associated with infringing private information. Therefore, CISA will enhance security within the Internet platform and reduce cyber-attacks.

Detractors suggest that CISA lacks means of boosting security and that the means of sharing information creates a vulnerability that can lead to surveillance. The provisions of the bill lack ways of addressing fears associated with the possibility of spying on personal data (Greenberg, 2015). The law could allow private firms to collect intelligence on specific individuals that can reduce the need to strengthen privacy protections. CISA lacks a means of limiting the usage of personal data obtained by private firms. The fact that the government requires private firms to share information related to online crimes that hurt the economy creates a vulnerable system that can be abused. For example, law enforcement agencies can use information collected for investigations and prosecutions that are based on digital communications. CISA has loopholes that allow information sharing without adequate protections that can ensure the privacy of clients.

CISA seeks to improve cyber-security by creating a legal system for the sharing of information about security threats. Detractors of the bill are mistaken when asserting that information shared could be used to prosecute a person since CISA enforcement limitations advice against such activities. The purpose of the bill is to streamline the process of sharing information in a way that guarantees the protection of private information.

References 

Greenberg, A. (2015, March 20). CISA security bill: An F for security but an A+ for spying. Wired.com . Retrieved from https://www.wired.com/2015/03/cisa-security-bill-gets-f-security-spying/.

Moreno, J. V., Rockwood, E. J., Carey, P., & Gerver, K. (2016). Potential risks and rewards of cybersecurity information sharing under CISA. Cadwalader . Retrieved from https://www.cadwalader.com/uploads/cfmemos/8668f2fed1449aa81848c8f6c8a93f6e.pdf

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). The Cyber-Security Information Sharing Act (CISA) .
https://studybounty.com/the-cyber-security-information-sharing-act-cisa-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration