Journal Entry 13

In regards to the “short arm” viewpoint of knowledge, this is in reference to the fact that we as individuals have a limited plane of view to predict what could happen. So when implementing things like policy and infrastructure for cyber security, we have to put our best foot forward in hopes that the data we do have is efficient enough to create a working and stable security blanket. Many times laws are created based on what we currently have which can be a very short arm per se but if something out of the ordinary were to happen or the law is too vague and can be easily argued against by the prosecutor or the defense, policymakers can get to work in creating a new bill or legislation to update or replace present ones. We see this in the supreme court a lot and in regards to cyber policy, we can look at a recent event such as Carpenter v. United States which argued his fourth amendment rights were violated in terms of the privacy of his phone and belongings and they needed the acquisition of a warrant. Cyber security is ever adapting and so is technology so I think being able to create a system where policy and infrastructure are easily updateable and pliable to mold to what best works for our systems put in place would be efficient. More often than not legislation takes a long time to pass through the many levels of government and wouldn’t make a change by the time it is implemented. I think if there was an agency such as the CISA that was given permission to do these things under the strict supervision of the federal government, they could best implement change for our security in a timely manner. Cyberinfrastructure already has this implemented where patches and updates to networks, applications, systems, etc. can be done in a relatively timely manner so my only proposal would be is developing technology that is more user friendly to updates and to make the systems that do the new installment work as efficiently and quickly as possible. This way the downtime does not cause more security risks and the mainframes of systems and be back up in running.

Leave a Reply

Your email address will not be published. Required fields are marked *