ePortfolio entry 6

1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

2. How does cyber technology impact interactions between offenders and victims?

Cyber-policy and cyber-infrastructure are important in the cyber world today. Cyber policy outlines the requirements you must take to secure your data. It goes over the security softwares you need to implement to better protect your system. It is basically a guideline to help keep your info protected. A cyber-infrastructure consists of your computing system, networks, and severs. It is where you store all your data. We should approach the development of cyber-policies and cyber-infrastructure lightly because of the “short arm” given to us from predictive knowledge. It is important that advancements are made in the cyber world to help find more strong and secure methods to protect private data but we are not always sure what are the right ones. It is a lot of guessing and predictions being made that could lead to mistakes but that helps us to see what the best approaches would be. We can learn a lot from our mistakes. That is why I believe we should take a positive and a light approach to this development because it can help in securing our network, but the limited knowledge of the subject could lead to some mistakes.

Cyber technology has created a negative impact regarding interactions between offenders and victims. Cyber technology has made it easier for criminals to steal from people whether it be their identity, credit/ banking info, medical records, or other personal data. Before criminals would have to physically interact with people to obtain this information but now it can all be done online. They could easily trick people into believing they were giving their information to people they trust. They could even just be hacking in their computers to retrieve this information by sending out malware. The growth rate of cybercrime is increasing rapidly because of the advancements in cyber technology.

Leave a Reply

Your email address will not be published. Required fields are marked *