-
Essay / Reasons why we need a cybersecurity law
There are many reasons why it is extremely difficult for existing conventional law to manage the existing challenges with cyberspace. Some of the reasons have been discussed as follows: Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”?Get the original essayCyberspace is an intangible dimension that cannot be governed and regulated using conventional law. Cyberspace has no importance for any sort of jurisdictional boundaries. In India, a person could break into a bank's electronic safe hosted on a computer in the United States and transfer millions of rupees to another bank in Switzerland, all within minutes. All a person would need is a laptop and a cell phone. Cyberspace handles giant volumes of traffic every second. Billions of emails are distributed around the world. Cyberspace is absolutely open for people to participate. It does not identify who has a real identity and who has a fake one. Easy accessibility makes communication even easier. A ten-year-old in Bhutan can have a live chat session with an eight-year-old in Bali without worrying about the distance or anonymity between them. This tells us about the geographic reach of cyberspace. Cyberspace offers vast potential for anonymity to its members. Readily available encryption software and steganography tools that transparently hide information in image and sound files ensure the confidentiality of information exchanged between cyber citizens. Cyberspace offers economic tenacity never before seen. Software worth billions of rupees can be traded over the Internet without the need for a government license, shipping and handling charges, and without paying customs duties. This leads to huge economic losses for the software creator as well as the government that charges taxes. Electronic information has become the main element of cybercrime. It is characterized by extreme mobility, which far exceeds the adaptability of people, goods or other services. International computer networks located in different geographic locations can transfer huge amounts of data across the world in seconds. A software source code worth millions of rupees or a movie can be pirated across the world [1] within hours of its release. It has become very common these days to see a movie leaked on illegal websites for free download. This undermines the originality of any content available online. Theft of bodily information (e.g. books, papers, CD-ROMs, floppy disks) is easily covered by traditional criminal provisions. However, the problem begins when electronic documents are copied quickly, discreetly and often via telecommunication means..