How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

The “short arm” of predictive knowledge refers to the fact that each situation’s perspective and ethical behavior are instantly obvious, and there is no way to analyze the defects of that action since there is no ability to foresee the future repercussions of the choice taken at the time of the action. It is critical to keep this lack of omniscience in mind while creating cyber policy and infrastructure. To maintain physical integrity, to prevent unnecessary breaches, and moral integrity, to ensure that the well-being of persons who rely on the infrastructure is considered, policies and infrastructure must be assessed and updated on a regular basis. When it comes to the use of cyberspace technologies such as encryption and social media, cyber policy establishes guidelines for acceptable conduct. By regularly updating cyber rules, you can improve your consumers’ convenience and security.

By design, there are well-defined boundaries that repel both external and internal threats, as well as privacy problems. When vulnerabilities are discovered and perhaps exploited in the future, it will be able to alter rules to provide tighter protection. If this opportunity is not exploited, the situation’s ethical standing will be questioned. According to consumers, developers should often update and improve their products. Maintaining current cyber policy is inextricably linked to maintaining existing cyber infrastructure. The term “cyber infrastructure” refers to the network that connects systems and data over the internet to provide a unified experience. It is vital to maintain an up-to-date and safe infrastructure in order to ensure the economic, public health, safety, and welfare systems’ long-term survival. When a country’s infrastructure is threatened, its general well-being is jeopardized as well. Citizens’ livelihoods will be impacted if no safe infrastructure is in place. When weaknesses in society’s infrastructure are discovered, it is critical to address them immediately and work toward a more secure future system.

Legal ways to make money in Cybersecurity.

Create app that rates software.

Yacht GPS software that is secure.

Blocking hackers from attacking a company.

E-commerce security.

Rent out a space to cybersecurity company.

Set up a firewall for website.

Eventually create your own cybersecurity company.

Car GPS software that is secure.

Unite multiple companies to report hacks in order to improve security for them all.

Rate a companies security system and suggest steps on how to improve it.

Instruct groups of people how to improve cybersecurity.

Teach cybersecurity in college.

YouTube transaction security.

Why are you interested in Cybersecurity Technology?

Cybersecurity is one of the radically boosting fields in technology and overall professions. Since our world is evolving to globalization more and more every day, the chances of living in an entirely virtual or digital world in a few years are vast. As this world gets more digital and communications shift completely from physical to electronic, maintaining our digital identity and information security will become mandatory, making Cybersecurity come in handy and raising the demand for Cybersecurity professionals. Aside from the high demand, many reasons attract me to study and pursue Cybersecurity. I will be discussing a few in the coming paragraphs.
First and foremost, Cybersecurity relates to my skill and eagerness to solve problems. AS Cybersecurity mainly involves giving or maintaining digital security; it would require you to find a way to build a wall that intruders can not be able to break. The problem is always intruders, and you are the solution. I have always been good at solving critical issues, and this skill would be more developed and effective if I dive into the field of Cybersecurity. Another skill that would motivate me to join Cybersecurity is my critical thinking skill. I am good at critiques. Both positive and negative. I am an excellent observer and spot errors, blind spots, or gaps. These skills make me excel in parts of Cybersecurity subjects like penetration testing. Which would help secure the system more efficiently.
Secondly, Cybersecurity is an interdisciplinary field and gives you more options to branch out to and study on the side as well. As for me, I love computers, security, technology, and justice. In addition to that, I have a curious mind that likes to ask questions, do further research, and investigate situations. Highly linked with the skills I mentioned, I find Criminal Justice to be a field that attracts me. Cybersecurity is an interdisciplinary field that can work jointly with Criminal Justice, and this is why I chose it over other Tech fields that align with my soft skills.
Last but not least, I want to give back to the community in the cyber world by decreasing the gap the digital world creates in the social construct and help create awareness for small businesses and unprivileged communities.