Site icon The Word 360

Cyber Security Safety Acts and Why it’s Necessary

&Tab;&Tab;<div class&equals;"wpcnt">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"wpa">&NewLine;&Tab;&Tab;&Tab;&Tab;<span class&equals;"wpa-about">Advertisements<&sol;span>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"u top&lowbar;amp">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<amp-ad width&equals;"300" height&equals;"265"&NewLine;&Tab;&Tab; type&equals;"pubmine"&NewLine;&Tab;&Tab; data-siteid&equals;"173035871"&NewLine;&Tab;&Tab; data-section&equals;"1">&NewLine;&Tab;&Tab;<&sol;amp-ad>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div>&NewLine;<h1 class&equals;"wp-block-heading"><strong>What is meant by the term &OpenCurlyDoubleQuote;Cyber”&quest;<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">Cyber means anything that is digital&period; It can be your devices that are performing the digital computation&period; Anything that is related to the Internet falls under the category of Cyber&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>How big Cyber Space is&quest;<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">While Cyberspace should not be confused with the internet&comma; the term is used to represent identities or events that take place in the communication process itself&period; For Example&comma; think of a Website&comma; it also exits in CyberSpace&period; Social interactions whether you do a post&comma; upload a picture or even share a message&comma; these all social interactions exist in Cyber Space and this Cyber Space is expanding not in minutes but in seconds&period; These all events are taking place not on their physical locations but &OpenCurlyDoubleQuote;in cyberspace”&period; You can see an image below consisting of various digital devices that are connected through the internet&period; Their whole communications exist in cyberspace&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>Why does cyber security matters&quest;<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">These are some of the reasons you should think about having to learn cyber security&comma; whether you want to do so for personal use&comma; to advance in your career&comma; or to start a new one&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ul class&equals;"wp-block-list">&NewLine;<li>Let’s face it&semi; we live in a digital world&period; The internet&comma; mobile computing&comma; and electronic media have started to take over our work lives&comma; personal lives&comma; and financial lives&period; As a result&comma; we are more exposed than ever to malicious attacks&comma; privacy invasions&comma; fraud&comma; and other threats&period; This is why having a secure and well-organized digital world depends so heavily on cyber security&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>It is estimated that between 2019 and 2023&comma; cyber-crimes would cost the world &dollar;5&period;2 trillion&comma; necessitating a &dollar;10 billion global investment in cyber-security measures by 2027 to guard against such catastrophic losses&period;it means the job pay is good and increasing<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>According to reports&comma; there are currently more than 3&period;5 million cyber security jobs open worldwide&period; Information technology&comma; healthcare&comma; finance&comma; communications&comma; the industrial sector&comma; etc&period; are all affected&comma; but there aren’t nearly enough skilled workers to meet the demand&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Not only large businesses and organizations are impacted&period; For instance&comma; it only takes five minutes to hack a device that is connected to the internet&comma; Its effects are felt both in the physical and digital worlds&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Continual acquisition of new knowledge&comma; working to comprehend new technologies you’ll constantly face new obstacles and be presented with a wide range of opportunities&period;<&sol;li>&NewLine;<&sol;ul>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>The Cyber Security Enhancement Act and the SPY ACT<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">The Cyber Security Enhancement Act of 2002 mandates life sentences for hackers who &OpenCurlyDoubleQuote;recklessly” endanger the lives of others&period; Malicious hackers who create a life-threatening situation by attacking computer networks for transportation systems&comma; power companies&comma; or other public services or utilities can be prosecuted under this law&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-image size-large"><img src&equals;"https&colon;&sol;&sol;theword360&period;com&sol;wp-content&sol;uploads&sol;2022&sol;10&sol;1-1024x682&period;jpg" alt&equals;"" class&equals;"wp-image-9461"&sol;><figcaption class&equals;"wp-element-caption">Photo by <a href&equals;"https&colon;&sol;&sol;unsplash&period;com&sol;&commat;tingeyinjurylawfirm&quest;utm&lowbar;source&equals;medium&amp&semi;utm&lowbar;medium&equals;referral">Tingey Injury Law Firm<&sol;a> on <a href&equals;"https&colon;&sol;&sol;unsplash&period;com&sol;&quest;utm&lowbar;source&equals;medium&amp&semi;utm&lowbar;medium&equals;referral">Unsplash<&sol;a><&sol;figcaption><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">The Securely Protect Yourself Against Cyber Trespass Act of 2007 &lpar;SPY ACT&rpar; deals with the use of spyware on computer systems and essentially prohibits the following&colon;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<ol class&equals;"wp-block-list" type&equals;"1">&NewLine;<li>Taking remote control of a computer when you have not been authorized to do so&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Using a computer to send unsolicited information to people &lpar;commonly known as spamming&rpar;&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Redirecting a web browser to another site that is not authorized by the user&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Displaying advertisements that cause the user to have to close out of the web browser &lpar;pop-up windows&rpar;&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Collecting personal information using keystroke logging&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Changing the default web page of the browser&period;<&sol;li>&NewLine;&NewLine;&NewLine;&NewLine;<li>Misleading users so they click on a web page link or duplicate a similar web page to mislead a user&period;<&sol;li>&NewLine;<&sol;ol>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>The SPY ACT<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-image size-large"><img src&equals;"https&colon;&sol;&sol;theword360&period;com&sol;wp-content&sol;uploads&sol;2022&sol;10&sol;2-1024x682&period;jpg" alt&equals;"" class&equals;"wp-image-9462"&sol;><figcaption class&equals;"wp-element-caption">Photo by <a href&equals;"https&colon;&sol;&sol;unsplash&period;com&sol;es&sol;&commat;chrisyangchrisfilm&quest;utm&lowbar;source&equals;medium&amp&semi;utm&lowbar;medium&equals;referral">Chris Yang<&sol;a> on <a href&equals;"https&colon;&sol;&sol;unsplash&period;com&sol;&quest;utm&lowbar;source&equals;medium&amp&semi;utm&lowbar;medium&equals;referral">Unsplash<&sol;a><&sol;figcaption><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">The SPY ACT is important in that it starts to recognize annoying pop-ups and spam as more than mere annoyances and as real hacking attempts&period; The SPY ACT lays a foundation for prosecuting hackers that use spam&comma; pop-ups&comma; and links in emails&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>18 USC&comma; 1029 and 1030<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">The U&period;S&period; Code categorizes and defines the laws of the United States by titles&period; Title 18 details &OpenCurlyDoubleQuote;Crimes and Criminal Procedure&period;” Section 1029&comma; &OpenCurlyDoubleQuote;Fraud and related activity in connection with access devices&comma;” states that if you produce&comma; sell&comma; or use counterfeit access devices or telecommunications instruments with the intent to commit fraud and obtain services or products with a value of over &dollar;1&comma;000&comma; you have broken the law&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">Section 1029 criminalizes the misuse of computer passwords and other access devices such as token cards&period; Section 1030&comma; &OpenCurlyDoubleQuote;Fraud and related activity in connection with computers&comma;” prohibits accessing protected computers without permission and causing damage&period; This statute criminalizes the spread of viruses and worms and the breaking into computer systems by unauthorized individuals&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>U&period;S&period; State Laws<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">In addition to federal laws&comma; many states have their laws associated with hacking and auditing computer networks and systems&period; When performing penetration testing&comma; review the applicable state laws to ensure that you are staying on the right side of the law&period; In many cases&comma; a signed testing contract and an NDA will suffice as to the intent and nature of the testing&period; The National Security Institute has a website listing all the state laws applicable to computer crimes&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">The URL is&colon; <a href&equals;"https&colon;&sol;&sol;nsi&period;org&sol;Library&sol;Compsec&sol;computerlaw&sol;statelaws&period;html">CLICK HERE<&sol;a> FOR MORE INFORMATION&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>The Freedom of Information Act &lpar;FOIA&rpar;<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">The Freedom of Information Act &lpar;5 USC 552&rpar;&comma; or FOIA&comma; makes many pieces of information and documents about organizations public&period; Most records and official documents are available through the FOIA&period; When conducting reconnaissance and gathering information about a potential target&comma; any information obtained through this act is fair game&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>The Privacy Act of 1974<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<figure class&equals;"wp-block-image size-large"><img src&equals;"https&colon;&sol;&sol;theword360&period;com&sol;wp-content&sol;uploads&sol;2022&sol;10&sol;3-1024x569&period;jpg" alt&equals;"" class&equals;"wp-image-9463"&sol;><figcaption class&equals;"wp-element-caption">Photo by <a href&equals;"https&colon;&sol;&sol;unsplash&period;com&sol;&commat;jdent&quest;utm&lowbar;source&equals;medium&amp&semi;utm&lowbar;medium&equals;referral">Jason Dent<&sol;a> on <a href&equals;"https&colon;&sol;&sol;unsplash&period;com&sol;&quest;utm&lowbar;source&equals;medium&amp&semi;utm&lowbar;medium&equals;referral">Unsplash<&sol;a><&sol;figcaption><&sol;figure>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">The Privacy Act of 1974 &lpar;5 USC 552a&rpar; guarantees the nondisclosure of personal information and prevents government agencies from doing so without the person whose information is in question’s prior written consent&period;<&sol;p>&NewLine;&NewLine;&NewLine;&NewLine;<h1 class&equals;"wp-block-heading"><strong>The USA PATRIOT Act<&sol;strong><&sol;h1>&NewLine;&NewLine;&NewLine;&NewLine;<p class&equals;"wp-block-paragraph">The government now can intercept voice communications in cases involving computer hacking and other types of investigations thanks to the Act&comma; officially known as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism &lpar;USA PATRIOT&rpar; Act of 2001&period; Although the Patriot Act was primarily passed to address terrorist activity&comma; it can also be seen as a wiretap tool to identify and stop hacking attempts&period;<&sol;p>&NewLine;

Exit mobile version