Journal Entry #13

There is a specific approach that we should take when developing cyber-policies and infrastructure, despite the “short arm” of predictive knowledge. I believe this is one of the greatest advantages we have when developing a cyber policy. What I mean by that, is that the only way to account for the short arm of predictive knowledge is to develop policy and infrastructure with this thought at the forefront of our minds. Knowing that we cannot pinpoint how things will exactly pan out in the future with cyber technology and societal implications pertaining to cybersecurity, it would be wise to allow for a reasonable amount of growth built into the development process. Once the concept of the internet was made real, we knew that it would become quite popular. To what degree, we were not sure and to this day it continues to grow as we still don’t know at what rate. The saving grace that has allowed for us to maintain the infrastructure of the internet is the fact that we built the infrastructure with growth in mind. This is the same approach that should be taken when designing and developing cyber-policy and infrastructure as we progress through time. For cyber policy, it is somewhat difficult to do as it is important the policy can grow with the times. We are not aware of what capabilities the technology may bring to the table in the future so for our present policy development we want to have the foresight that would prevent any violation of policy when new advancements are made. The same concepts apply with infrastructure. Availability, security, and speed are the main three components that are of focus when developing cyber infrastructure. In order to account for the rapid growth and demand in all of those areas, the infrastructure must be built using one of two models. The first being “plug and play”, where additional components can be added to the existing components to amplify the capabilities of the current devices. The other model is to use recyclable devices.  This model incorporates devices that essentially don’t age as they provide core functionality in networks and when their usage is outdated they can be recycled and used for another tasks to help the efficiency of the network.

Leave a Reply

Your email address will not be published. Required fields are marked *