1.How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
A Cyber- policy is a policy that sets the standards of behavior for activities such as the encryption of email attachments and restrictions on the use of social media. Cyber-attacks are one of the worst attacks costing billions each year. As a matter of a fact according to Statistics in the United States, the average annual cost of cybercrime rose 29 percent in 2018, this shows a significant amount of increase in damage, and since 2018 it has increased significantly. In 2020 cyber-crime skyrocketed to nearly one trillion dollars. Seeing the massive damage being done how should we approach the development of cyber- policy and infrastructure. One of the ways we can approach this policy and infrastructure is with risk assessment. It’s important because cybersecurity risk assessment identifies the information assets that could be affected by a cyber-attack such as Hardware, systems, laptops, customer data, and intellectual property. It then identifies the risk that could affect those assets. It’s important to consider risk assessment when developing these policies. Technology is growing by the minute, and it has become the lifeline to most things. Because technology it’s growing rapidly it is important to have an up to date, and stable system. Many businesses and people depend on these technologies to guarantee them privacy and safety from cybercriminals. There is no way of knowing when future attacks might take place and that’s where the “short arm” of predictive knowledge exists, however, there are ways to fix this obstacle in order to benefit the people and businesses of society. In my opinion, another way to approach the development of cyber- policy and infrastructures is by teaching people, it might be difficult, but it can also be part of the solution. Overall cyber policy and infrastructures should be considered by everyone because they have the power to reduces costs due to cyber-attacks.