-
Essay / Cybersecurity Act of 2012 - 882
With the development of science and technology, the Internet has become a part of people's lives. Hackers threaten not only the cybersecurity and privacy of citizens, but also the economy, security, and lives of all citizens of the United States. In mid-November 2011, Russian hackers failed to attack a water treatment plant in Illinois (Nakashima). This is why the Cybersecurity Act of 2012 was passed. The Cybersecurity Act of 2012 is “a bill to strengthen the security and resiliency of the United States’ cybersecurity and communications infrastructure” (“S.2015”). The Cybersecurity Act of 2012 was the battle between national security and privacy. In this article, I will present three different positions taken by people on the issue of the Cybersecurity Act of 2012. People in general will be affected by the Cybersecurity Act of 2012 because it matters for privacy and national security . Normal citizens like us will be really interested. in this because this government could observe everything and there is no privacy for people. Government personnel like Senators, House Representatives and even President Obama might be interested in this issue because they need to find a balance between supporters and opponents because it is a truly controversial issue. People may want to protect their privacy, but things will get worse if hackers destroy all national security defenses. Taxpayers will also be interested in this because they want to know how much they have to pay for this act to actually be carried out and how it will affect the national economy and their benefits. My first position is in favor of passing the Cybersecurity Act that allows government and businesses to exchange information and prevent attacks to prevent hackers from destroying...... in the middle of paper... their own activity could be affected. According to Stiennon, the Cybersecurity Act of 2012 will force “utility operators, banks and land resource companies to comply with outdated asset-based frameworks and deflect vulnerability methodologies.” to implement threat-based defenses” (Stiennon), which means that this act could affect the activities of IT companies, their own privacy and relationships with users. Businessmen could pay more attention to the relationship with users and business profits. If users stop using anything related to the Internet, business for IT companies will struggle. People who share this view believe that this law only benefits both parties. It's a waste of money and hurts both parties. My final position is that a few people think the company