e-portfolio #7

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Cyber policy is the overall approach of making sure people are safe from threats on the internet like cybercriminals. In today’s society, everyone puts their trust in technology to store, collect, and manage their private information. Many people do not know of the potential harm that comes with doing that. This is where the development of cyber policy comes in. Companies need cyber policies to create a guideline for protection against threats to the companies infrastructure. The development of Cyber policy is needed not only for the guidelines of protection of data but also for the protection of an individual’s private information. I believe that certain cyber policies are very important and lay a good foundation for basic cybersecurity success. For example, many specific cyber policies such as Virus Protection Policy established guidelines on how to protect yourself and others from viruses.  Anybody that is trying to prevent harm should be studying and trying to identify the best practices to stop potential harm. The development of cyber policy is the most important and effective way for companies to protect and defend themselves and customers’ personal information, and this should be the biggest priority for all companies old and new. We should approach cyber policy and infrastructure closely with the NIST cybersecurity framework. NIST’s five core functions include identifying, protecting, detecting, responding, and recovering. This five help in the approach of creating cyber policy and helping a company’s infrastructure. These five components are all dependent on each other and are very effective when used together correctly. When they are all used together they create a very strong system that can last a long time. This is the way I would approach developing cyber policy and infrastructure. This may seem like a very complex topic, but if it’s followed along with the NIST cybersecurity framework.

Leave a Reply

Your email address will not be published. Required fields are marked *