Table of Contents
Introduction
Cybercrime is the crime that involves computer and network whereby an individual get access to confidential data without the knowledge of the owner. Cybercrime include hacking, unwarranted mass surveillance, copyright infringement and child grooming. This issues are threat to the national security, an individual and financial health because it became a major problem when important information get to the hands of unauthorized people. Companies or organizational reputation may be damaged. Industries such as banking and insurance are at risk of losing substantial amount of money through this kind of crime. Government and the concern authorities should develop means to intercept this challenge to safeguard sensitive organizational data and properties. Strict laws should be put in place and skilled personnel in the area of cyber security should be hired and this will help in pulling down this trend that is an emerging issue globally.
The rate at which this issue is growing has provoked many ethical questions. There is concern on the level of knowledge the cyber security personnel have for curbing this major problem. The cyber security experts should charge themselves with the responsibility of keeping sensitive information safe. People should be sensitive to embrace integrity since it is the lack of this virtue that leads to cyber-attacks theft.
Government has an upper hand in providing security to its subjects when it comes to cyber-attacks. There are many laws that has been set by the government to monitor the activities of any person accessing information in the internet. All countries in the world have their own laws but there laws are almost the same (Brenner, 2014). Any person who fails to comply with this laws is liable for a penalty which may be to be put behind bars or fine of large amount of money.
Some of the cybersecurity regulations included in many countries’ constitution are Health insurance portability and accountability act and homeland security management act. These laws are very essential in that health of the people are preserved since medical record are well protected. Morality of the nations is well preserved since laws have been set that lock out child pornography. Spreading of lies is totally prohibited and political malpractice act are provided by these laws (Von Solms & Van Niekerk, 2015). Information technology and cybersecurity professionals are the concern individuals in addressing this emerging issue they have the knowledge and understanding of the problem of cyber-attacks and expertise to provide solution in case the challenge arises. These professionals should show responsibility and concern in providing help as far as this challenge is concerned. Integrity should be the value governing their activities.
When faced by such crimes the best thing to do is to report the matter to cyber security department. Cyber security department will help in tracing the culprits and forwarding them to the relevant authority for punishment. Also the government authorities can be informed because they have in place the cyber security personnel handle the matter with cyber-attack. When the loopholes have been identified the best thing do is to hire cyber security expert to seal the loophole to avoid such a problem in the future (Cheung, Lindqvist & Fong, 2003). In solving any kind of problem approach is the key. To solve the problem at hand the best direction to the ethical approach as that will have lasting effect to the area of information privacy. Through dialogue and debate with the relevant authorities there is possibility of coming up with a solution.
Conclusion
In conclusion, cyber-attacks has become a major threat the globally and there is need of the cyber intelligence to be used to bar this emerging trend. It is proven that it has severe impact to the operation of any organization when it occurs. Strict laws has to be enforced to protect valuable information from landing in the hand of unauthorized people and cyber security professionals with vast knowledge should be hired in order to provide a lasting solution.
References
- Brenner, S. W. (2014). US cybercrime law: Defining offenses. Information Systems Frontiers, 6(2), 115-132.
- Von Solms, R., & Van Niekerk, J. (2015). From information security to cyber security. Computers & security, 38, 97-102.
- Cheung, S., Lindqvist, U., & Fong, M. W. (2013, April). Modeling multistep cyber-attacks for scenario recognition. In Proceedings DARPA Information Survivability Conference and Exposition (Vol. 1, pp. 284-292). IEEE.