Module 6

How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?

While its difficult, if not impossible, to know what the future holds from a cyber security standpoint. There are still ways we can about trying to future proof a cyber security program to the best of our current ability. Starting by identifying your work environment, identifying your crown jewels, and determining your worst-case scenarios and concentrating on those areas. In addition to this you want to implement programs, processes, and procedures that can be built upon as any good vulnerability management program will be designed to mitigate as much risk as possible. The implementation of security information and event management software with the addition of custom rules to help identify anomalies in your environment and update it as new threats are identified. Ensure your company also conducts regular penetration tests to identify unknown or exploitable applications, permission sets, etc. Employees should also be considered a vulnerability, implementing a comprehensive security training program for all employees will help to reduce to potential risk of someone inadvertently exposing the company to potential risk. Implementation of a threat intelligence program will also be beneficial, understanding the current threats to your industry is crucial in ensuring that you have the proper defenses in place to mitigate those specific risks. Cyber security will always be an uphill battle with constantly changing rules and threats, you can’t control the threats, but you can control your landscape and attack surface, as well as your ability to detect ever changing threats.

How does cyber technology impact interactions between offenders and victims?

Cybercrime is the most common form of crime. And while it is certainly a difficult problem for cyber security specialists and computer scientists. Its also a huge issue for law enforcement as well. One reason that cybercrime has become so prevalent is because people tend to be more willing to dehumanize people when they trust that they’re anonymity remains preserved when operating online. Through that perceived sense of anonymity, people tend to act differently, for better or worse. Cyber crimes come in many different forms, and they all tend to cause psychological harm to the victim. These crimes could be anything from hacking into an individual’s phone and leaking private images online, to convincing someone to share personal banking information and having them watch as their finances are eviscerated. Cyber criminals can destroy data, steal intellectual property, blackmail, etc. And often the victims of these events receive little in the way of compensation and justice, if any at all. Unfortunately, this is a problem that won’t be going away any time soon either.

References

Http://orcid.org/0000-0001-7217-5166, M. (n.d.). Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap. Retrieved October 15, 2020, from https://www.tandfonline.com/doi/full/10.1080/01639625.2017.1411030

Leave a Reply

Your email address will not be published. Required fields are marked *