SOPA and PIPAA Story by Winnie MeldaThe Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA) bills as define din the United States as a way of enforcing the law against the protection of the websites was projected to have of potentiaThe PIPA bill is quite
effective compared to the SOPA. However, the two bills placed together has
given power to the entertainment industry to ensure that potential benefits are
realized by the eligible persons (Condon, 2012). The engineers were the
supposed to be the critical stakeholders and facilitators of the recent cyber
security bills as they well understand the potential points that piracy is well
looped. In designing of the network, the engineers would have defined some of
the security initiatives to get impacted as mandatory to ensure that no
spoofing, snooping and misusing of other IP addresses. Despite the deployment
of the security resolver function by the Domain Name System Security Extension
(DNSSEC), to check on authenticity, some more reliable ways should have been
put in place as the subordinate to the others. This would ensure proper
authentication and block of malicious frauds and other activities over the
global network (Rosenzweig, 2012). Therefore, the engineers were necessary to
provide the directives on how the bills should state in regards to prevention
than providing jurisdictions to the acts. According to the
analysis done, the designing of the networks to easily incorporate the feature
of preventing and identifying the culprits was not stated in the bills yet it
sounds the basis of everything. The point is to have the proper definition of
network designing standards that tightens the security over the networks to
ensure that applications are highly protected (Wadlow, 2000). References Condon, S. (2012). SOPA, PIPA: What you need to know. Retrieved from http://www.cbsnews.com/news/sopa-pipa-what-you-need-to-know/ Rosenzweig, P. (2012). Online Piracy and Internet
Security: Congress Asks the Right Question but Offers the Wrong Answers.
Retrieved from
http://www.heritage.org/research/reports/2012/01/online-piracy-sopa-and-internet-security-pipa-bills-in-congress Wadlow, T. A. (2000). The process of network
security: Designing and managing a safe network. Reading, Mass. [u.a.:
Addison-Wesley. Author is associated with MeldaResearch.Com which is a global free research papers provider. If you would like help in essays, research papers, term papers and dissertations, you can visit ResearchPapers247.com © 2018 Winnie MeldaReviews
|
Stats
90 Views
1 Review Added on February 20, 2018 Last Updated on February 20, 2018 Tags: Custom essay writing service, essay writing service AuthorWinnie MeldaNew York, NYAboutWinnie Melda is an academic writer and an editor and she offers academic writing help online. Thus, people that doubt their own writing abilities can use the best paper writing service for sale online.. more..Writing
|