Reasearch paper

User Generated

fvqfvquh

Computer Science

Description

Please submit the paper of 3000 to 4000 words.

Topic:-  cyber intelligence sharing and protection act

Note:-

Please do not copy and paste 

no plagarism,do not copy from any source or internet.

Turnit in is enabled. 

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

CISPA Outline
Introduction
The topic of discussion is cyber intelligence and protection act. The paper aims at
understanding the pros and cons of the law that really faced a lot of critic because it was
perceived to be similar to the previous cyber related laws. However, the paper has clearly
indicated as to why the passing of this law was of great importance to the internet world. This
has been supported by various cyber laws that have been there before in various countries like
India.
First Paragraph
1. In support of the topic, the first paragraphs clearly illustrate what cyber laws are. They do
this by clearly illustrating the meaning of cyber laws.
2. It also looks at what happens if individuals go against this particular set laws. It goes
further to categorize these cyber laws to bring a clear difference among them with the
aim of bringing out clearly their arears of application.
3. The cyber law conditions and terms of online or internet use have been mentioned. These
terms clearly indicate and come as a warning to the users to be cautious as they use the
internet to avoid colliding with the set laws. It has also clearly illustrated some of the
professions in the cyber law field who handle these things.
Second Paragraph
1. To clearly understand why cyber laws need to be set and why the CISPA is a great
deal. The understanding of cybercrime is very key. This section clearly defines the

meaning of cybercrime and how it relates to breaking of the law. It has clearly
categorized these cybercrimes for clarity on why they are indeed crimes.
2. The trends in cybercrime have also been clearly illustrated. This clearly illustrates
where the future is headed on matters the safety on using the internet. These trends
also support the reason as to why there is a need for laws to prevent these new ways
of committing cybercrime.
Third Paragraph
1. Here, cybersecurity is being addressed. This is happening after looking at the
cybercrimes and the trends and this therefore calls for actions to be taken in
addressing the issues. This is the reason as to why the subtopic has been defined and
also cleared categorized. Strategies on how cybersecurity should be beefed up have
also been highlighted. Network security has also been mentioned.
2. The CISPA has been clearly highlighted from its incorporation into the US cyber
laws. It has highlighted the critics it faced and the reasons why it was so. It success
into becoming a law has also been stated and why. It was success and it is still
because the benefits overweighed the costs. It is thus a great milestone towards
curbing cybersecurity.
Conclusion
The paper has thus incorporated various laws in justifying why the CISPA has proven the
critics wrong. The law has proven to be helpful and much needed by the government,
organizations, and consumers. This paper validates the law to be accepted among the
stakeholders in making the future of the internet safe for use.


Running Head: CYBER INTELLIGENCE & SHARING PROTECTION ACT

Cyber Intelligence & Sharing Protection Act
Name of student:
Course:
institution:
Date of submission:

1

CYBER INTELLIGENCE & SHARING PROTECTION ACT

2

Cyber Intelligence & Sharing Protection Act
Table of contents

Page

1. Executive Summary ……………

2

2. Introduction …….

3

3. Cyber Law ……...

3

3.1 Cyber Law Categories ………

4

3.1cyber Law Categories………

5

3.2 Cyber Law Terms & Laws …………..

6

4. Cyber Crime …………

6

4.1 Cyber Crime Categories ……..

6

4.2 Cyber Crime Categories ………..

7

4.3 Mitigation of Cybercrime Risks ……….

7

5. Cyber Security …………

7

5.1 Cyber Security Strategies …………

8

6. Network Security …………

8

7. The CISPA ……………….

9

8. Outcome ……………………

12

9. References ……………..

14

CYBER INTELLIGENCE & SHARING PROTECTION ACT

3

1. Executive Summary
This paper aims at discussing cyber laws with more emphasize on cyber intelligence
sharing and protection act. Various sections include the table of the contents that gives directions
on what is presented in given topics. The introductory part outlines an overview of the general
discussion on the whole paper. The conclusion part gives various conclusion and
recommendations on what should be done to improve the cybersecurity issues in an attempt to
promote the cyber laws and more so the act.
A few definitions have been given to build on the discussion. The paper indicates why
this topic is vital in governing the usage of the internet. The main objective is to protect
consumers from exploitation. CISPA faces critics because it does not provide regulations on
people’s privacy, but the discussion proves it otherwise. Cybersecurity strategies have been
proposed to boost cyber laws. In addition to the techniques, the use of internet terms and
conditions are highlighted. The bibliography gives in detail the various...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags