By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData Collective
  • Analytics
    AnalyticsShow More
    construction analytics
    5 Benefits of Analytics to Manage Commercial Construction
    5 Min Read
    benefits of data analytics for financial industry
    Fascinating Changes Data Analytics Brings to Finance
    7 Min Read
    analyzing big data for its quality and value
    Use this Strategic Approach to Maximize Your Data’s Value
    6 Min Read
    data-driven seo for product pages
    6 Tips for Using Data Analytics for Product Page SEO
    11 Min Read
    big data analytics in business
    5 Ways to Utilize Data Analytics to Grow Your Business
    6 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-23 SmartData Collective. All Rights Reserved.
Reading: Cybersecurity legislation: Necessary governance or unnecessary control?
Share
Notification Show More
Latest News
cloud-centric companies using network relocation
Cloud-Centric Companies Discover Benefits & Pitfalls of Network Relocation
Cloud Computing
construction analytics
5 Benefits of Analytics to Manage Commercial Construction
Analytics
database compliance guide
Four Strategies For Effective Database Compliance
Data Management
Digital Security From Weaponized AI
Fortifying Enterprise Digital Security Against Hackers Weaponizing AI
Security
DevOps on cloud
Optimizing Cost with DevOps on the Cloud
Development
Aa
SmartData Collective
Aa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Cybersecurity legislation: Necessary governance or unnecessary control?
Security

Cybersecurity legislation: Necessary governance or unnecessary control?

Editor SDC
Last updated: 2010/11/06 at 3:56 PM
Editor SDC
2 Min Read
SHARE
- Advertisement -

Let’s face it–  the internet is a big, open, and sometimes scary place.  With all of it’s knowledge and  information sharing potential comes the threat of intellectual property loss, cyberattacks, and widespread security risks.  Still,  we rely on internet use every day for news, work and information of all sorts.  The rise of citizen and social media has created an open window to the state of the world we live in– Twitter has become our daily newspaper and blogs are the new memo pads.   Whic

Let’s face it–  the internet is a big, open, and sometimes scary place.  With all of it’s knowledge and  information sharing potential comes the threat of intellectual property loss, cyberattacks, and widespread security risks.  Still,  we rely on internet use every day for news, work and information of all sorts.  The rise of citizen and social media has created an open window to the state of the world we live in– Twitter has become our daily newspaper and blogs are the new memo pads.   Which is why (given the apparent risks involved) we can’t imagine completing many every day activities without it.

- Advertisement -

How would you feel if an organization had the power or authority to take control over or shut down this information for public safety?  What if they created a screen to protect us from explicit content like a parental control on cable tv?  Certain domains would be off limits like PG-13 or R ratings, or worse, the TV shuts off completely.  Would you begin to question the veracity or truth behind the internet?  Or wonder if our “open” web was starting to close?

These are questions many people are asking themselves as the recent “kill switch“ bill works through US legislation.  The bill would essentially provide our government the authority to shut down the internet in times of crisis or attack.   It’s an interesting debate that has been brought up this year and continues to make headlines as new officials are voted into government this week. 

More Read

encryption technology data protection sdc

7 Advantages of Using Encryption Technology for Data Protection

Posterous DOS attack. Someone should write the story

Should we give up our web surfing freedom for protection from cyber attack?   What are your thoughts on the issue?

Read more at No-IP Blog.

TAGGED: cyber attack
Editor SDC November 6, 2010
Share this Article
Facebook Twitter Pinterest LinkedIn
Share
- Advertisement -

Follow us on Facebook

Latest News

cloud-centric companies using network relocation
Cloud-Centric Companies Discover Benefits & Pitfalls of Network Relocation
Cloud Computing
construction analytics
5 Benefits of Analytics to Manage Commercial Construction
Analytics
database compliance guide
Four Strategies For Effective Database Compliance
Data Management
Digital Security From Weaponized AI
Fortifying Enterprise Digital Security Against Hackers Weaponizing AI
Security

Stay Connected

1.2k Followers Like
33.7k Followers Follow
222 Followers Pin

You Might also Like

encryption technology data protection sdc
Data ManagementPrivacyRisk ManagementSecurity

7 Advantages of Using Encryption Technology for Data Protection

11 Min Read

Posterous DOS attack. Someone should write the story

3 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US

© 2008-23 SmartData Collective. All Rights Reserved.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?