How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
We have become more dependent on technology in businesses and in our personal everyday lives as it continues to advance. Technology has made our lives more efficient, such as smart cars and smartphones. Eventually, a lot of businesses such as grocery stores and restaurants, for example, started having their own delivery and/or pickup services for their customers. Businesses have a more efficient way of keeping records and storing information. A disadvantage to us being more reliant to technology is that not many of us know how to use them efficiently or we are not aware of the risks of not being careful with how we are using technology. Because of this, cyber attacks happen often. Cyber-policy is constantly changing because systems and technology changes overtime. That means we always must adjust our ways of keeping our systems secure. The issue is even if we do a great job keeping up with technology, criminals will also learn new ways to find vulnerabilities and a cyber attack may still occur either way. The idea of cyber policies is to prevent any damages or limit the damages caused. To do that, we must understand the value of the personal information we hold in our systems and risk assessments should be done. This will also help us better prepare for any cyber incidents that may occur.
How does cyber technology impact interactions between offenders and victims?
Though cyber technology has made our lives easier, it has also given an opportunity to make individuals feel unsafe. Many offenders have used technology to victimize others rather than having any physical interactions with them. There are two types of cyber-crimes: cyber harassment and cyber stalking. These crimes can even be more terrorizing than physical harassment or stalking because we cannot see who is sending threats or who is intending harm. They can be done anonymously or sometimes with multiple people, and they can be in multiple locations committing these cyber-crimes. These cases also take more time to investigate with digital forensics because there are little to no hard evidence. In order to run an investigation accurately, large amount of data has to be collected in order to track the offender such as communication logs, IP addresses, browser history, etc.
Leave a Reply