SOPA and PIPA

SOPA and PIPA

A Story by Winnie Melda
"

The Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA) bills as define din the United States as a way of enforcing the law against the protection of the websites was projected to have of potentia

"

The PIPA bill is quite effective compared to the SOPA. However, the two bills placed together has given power to the entertainment industry to ensure that potential benefits are realized by the eligible persons (Condon, 2012). The engineers were the supposed to be the critical stakeholders and facilitators of the recent cyber security bills as they well understand the potential points that piracy is well looped. In designing of the network, the engineers would have defined some of the security initiatives to get impacted as mandatory to ensure that no spoofing, snooping and misusing of other IP addresses. Despite the deployment of the security resolver function by the Domain Name System Security Extension (DNSSEC), to check on authenticity, some more reliable ways should have been put in place as the subordinate to the others. This would ensure proper authentication and block of malicious frauds and other activities over the global network (Rosenzweig, 2012). Therefore, the engineers were necessary to provide the directives on how the bills should state in regards to prevention than providing jurisdictions to the acts.

According to the analysis done, the designing of the networks to easily incorporate the feature of preventing and identifying the culprits was not stated in the bills yet it sounds the basis of everything. The point is to have the proper definition of network designing standards that tightens the security over the networks to ensure that applications are highly protected (Wadlow, 2000).

References

Condon, S. (2012). SOPA, PIPA: What you need to know. Retrieved from http://www.cbsnews.com/news/sopa-pipa-what-you-need-to-know/

Rosenzweig, P. (2012). Online Piracy and Internet Security: Congress Asks the Right Question but Offers the Wrong Answers. Retrieved from http://www.heritage.org/research/reports/2012/01/online-piracy-sopa-and-internet-security-pipa-bills-in-congress

Wadlow, T. A. (2000). The process of network security: Designing and managing a safe network. Reading, Mass. [u.a.: Addison-Wesley.


Author is associated with MeldaResearch.Com which is a global free research papers provider. If you would like help in essays, research papers, term papers and dissertations, you can visit ResearchPapers247.com

© 2018 Winnie Melda


My Review

Would you like to review this Story?
Login | Register




Reviews

To further enhance cost-effectiveness of Custom Research Paper Services, there is a revision policy for the Custom Research Paper Writing Services where essayist review the task, despite the period that has elapsed since we presented your Legitimate Custom Research Paper assignment.

Posted 4 Years Ago



Share This
Email
Facebook
Twitter
Request Read Request
Add to Library My Library
Subscribe Subscribe


Stats

82 Views
1 Review
Added on February 20, 2018
Last Updated on February 20, 2018
Tags: Custom essay writing service, essay writing service

Author

Winnie Melda
Winnie Melda

New York, NY



About
Winnie Melda is an academic writer and an editor and she offers academic writing help online. Thus, people that doubt their own writing abilities can use the best paper writing service for sale online.. more..

Writing