Journal #6

1. How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

Cyber policies are critical as they cover most of the cyber coverage gaps that are out there. Cyberattacks are on the rise, and it becomes even more vital for companies to sit down and discuss what policies and infrastructure they have in place. Besides having insurances in place to help lower the damage, it isn’t easy to develop such policies as technology is constantly evolving. On top of becoming, it is just a challenging topic to grasp in general, especially to those that may not necessarily be in the field.
Risk assessment is also critical when developing these policies. A company would need to examine several factors, such as how important the customer’s data is. In terms of how to prepare for an attack, there is a simple answer. Sadly it is more about when the spell will occur rather than if one is going to happen.
Most attacks will be reasonably unpredictable as it is likely that the company would have no knowledge of it coming. Preparing for everything is the best you can do and then learn from an attack after it has occurred. The costs for these attacks and breaches continue to rise through the roof year after year, so that would certainly be another reason to have policies in place to try and help with that.
Overall, it is plain challenging to develop policies for a constantly changing field over the years and not exactly knowing what is to come until it has already happened. Several things should be kept in mind when trying to implement such policies and infrastructure. Every company today needs to consider cyber policies as attacks occur more often and are very costly today.

2. How does cyber technology impact interactions between offenders and victims?

The internet creates many opportunities to harm and victimize different people on a scale that was not possible before. Offenders can target somebody solely through the internet or use the internet to find the personal data of people they may be trying to stalk or harass in real life. Particularly on social media, people tend to post an abundance of personal data that offenders may use against you; for example, posting pictures while on vacation could inform a potential offender that your house is empty and could easily be robbed. Another way the internet sets up people to be victimized is by sharing something that was supposed to be private on a public form, shared without consent, or even used to blackmail. Sometimes, these can even go viral. Even scarier is there have been cases of webcams being hacked on personal computers. Predators also thrive on the internet, trying to persuade their victims to meet them in person, more than likely with evil intentions—TV shows like To Catch a Predator highlight this type of criminal behavior. The internet is not all bad, but hopefully, cyber technology developments will help make it a safer place in the future.

Leave a Reply

Your email address will not be published. Required fields are marked *