Government on Computer Scams2007Computer scams entail the following : 1 ) computer network break-ins 2 ) industrial espionage 3 ) softw ar package piracy 4 ) child porno 5 mail bombings 6 ) password sniffers 7 ) spoofing 8 ) ascribe brainpower fraud 9 ) `phising 10 ) evil pair off 11 ) etc (Computer , n .dAlthough , there atomic number 18 so more things that the political relation provided to serve as preventive measures for the concourse , including the following non to provide personal information including mother s inaugural propose passwords , social security numbers to anyone , to be familiar with people being dealt with , to shred personal info , etc , it is up to now the regimes province to regulate computer scams (Computer n .dFirst of all , it is the government s responsibility to protect its citizens fro m danger (Computer , n .dSecond , Congress passed net laws including : 1 ) The Communications Decency exercise 2 ) The Child Online security measures doing 3 ) The Child s Internet Protection Act (National , 2003 .
The aforesaid(prenominal) have been passed to address the problem on child soot on the internet , that is wherefore these should be properly and stringently implemented to regulate if non 2003Third , the people from the government are the typical ones who have the capacity to go after the ones involved in computer scams the government have special tools to be able to captivate these people , stop them fro m carrying out their illegal activities an! d maybe even lock them up (National , 2003Last but not least , the government has the capability of monitoring the internet to be able to keep people away from cyber attacks , for instance , it crumb install a monitoring capability that permits the law enforcers to go against up and map out or search for calling through with(predicate) the use of a court (National , 2003 . This is why the government should be involved in the regulation of computer scams (National , 2003ReferencesComputer takeoff (n .d . Retrieved exalted 22 , 2007 fromHYPERLINK hypertext transfer protocol /network .windowsusers .org /scams .html http / web .windowsusers .org /scams .htmlNational academy of Sciences (2003 . Internet Laws . Retrieved August 22 , 2007 fromHYPERLINK http /www .nap .edu /netsafekids /pp_li_il .html http /www .nap .edu /netsafekids /pp_li_il .html _Should the Government act to regulate computer scams why ? why not Page PAGE 0...If you want to impersonate a full essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment