{"id":352,"date":"2021-04-28T22:14:18","date_gmt":"2021-04-28T22:14:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/byeab001\/?p=352"},"modified":"2021-04-28T22:14:19","modified_gmt":"2021-04-28T22:14:19","slug":"eportfolio-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/byeab001\/2021\/04\/28\/eportfolio-entry-13\/","title":{"rendered":"ePortfolio entry #13"},"content":{"rendered":"\n<p>1.<strong>How should we approach the development of cyber-policy and -infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">A Cyber- policy is a policy that sets the standards of behavior for&nbsp;activities&nbsp;such as the encryption of email attachments and restrictions on the use of social media.&nbsp;Cyber-attacks are one of the worst attacks costing billions each year. As a matter of a fact&nbsp;according to Statistics&nbsp;in the&nbsp;United States, the average annual cost of cybercrime rose 29 percent in 2018, this&nbsp;shows&nbsp;a&nbsp;significant&nbsp;amount of increase in damage, and&nbsp;since&nbsp;2018 it has increased&nbsp;significantly. In 2020&nbsp;cyber-crime&nbsp;skyrocketed to nearly one&nbsp;trillion&nbsp;dollars.&nbsp;Seeing the massive&nbsp;damage&nbsp;being done how should we&nbsp;approach&nbsp;the development of cyber- policy and&nbsp;infrastructure.&nbsp;One of the ways we can approach this policy and infrastructure is with risk assessment.&nbsp;It&#8217;s important because cybersecurity&nbsp;risk&nbsp;assessment&nbsp;identifies&nbsp;the information assets that could be affected by a&nbsp;cyber-attack&nbsp;such as&nbsp;Hardware,&nbsp;systems, laptops,&nbsp;customer&nbsp;data, and&nbsp;intellectual&nbsp;property. It then identifies the risk that could affect those&nbsp;assets.&nbsp;It&#8217;s important&nbsp;to consider risk assessment&nbsp;when developing these policies.&nbsp;Technology is growing by the minute,&nbsp;and it has become the&nbsp;lifeline&nbsp;to most things.&nbsp;Because technology it&#8217;s growing rapidly it is important to have an up to date, and stable system. Many businesses and people depend on these&nbsp;technologies&nbsp;to&nbsp;guarantee them&nbsp;privacy and safety from cybercriminals. There is no way of knowing when&nbsp;future&nbsp;attacks might take&nbsp;place and that\u2019s where the \u201cshort arm\u201d of predictive knowledge&nbsp;exists, however, there are ways to fix this&nbsp;obstacle&nbsp;in order to benefit the people and businesses of society.&nbsp;In my opinion, another way to approach the development of cyber- policy and infrastructures is by teaching people, it might be difficult, but it can also be part of the solution.&nbsp;Overall&nbsp;cyber policy and infrastructures should be considered by everyone&nbsp;because they have the power to&nbsp;reduces&nbsp;costs&nbsp;due to&nbsp;cyber-attacks.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.How should we approach the development of cyber-policy and -infrastructure given the \u201cshort arm\u201d of predictive knowledge? A Cyber- policy is a policy that sets the standards of behavior for&nbsp;activities&nbsp;such as the encryption of email attachments and restrictions on the use of social media.&nbsp;Cyber-attacks are one of the worst attacks costing billions each year. As&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/byeab001\/2021\/04\/28\/eportfolio-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":16668,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/352"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/users\/16668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/comments?post=352"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/352\/revisions"}],"predecessor-version":[{"id":353,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/posts\/352\/revisions\/353"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/media?parent=352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/categories?post=352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/byeab001\/wp-json\/wp\/v2\/tags?post=352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}