The Short Arm of Predictive Knowledge


Discussion Board Question: From this week’s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?

I believe it is essential to constantly modify the development of cyber policies and infrastructure using the Short Arm of Predictive Knowledge. There is no way to determine the future of the cyberspace. There are constant advancements with technology in today’s world. Different cyber crimes/cyber attacks can be committed everyday. Cyber crimes/cyber attacks that can be committed consist of identity theft, phishing attacks, terrorism, data breaches, viruses, malware, etc. It is hard to predict which cyber crimes/cyber attacks are going to be executed onto innocent online users. The development of cyber policies and infrastructure need to be constantly updated due to the uncertainty of which cyber crimes and cyber attacks are going to be executed, the severity of these cyber crimes and cyber attacks, and the uncertain future of the cyberspace. A cybersecurity policy consists of guidelines and principles that are intertwined into a policy to ensure that a company’s employees know how to react when there is a cyber crime/cyber attack taking place. According to Gartner, “A cybersecurity policy defines and documents an organization’s statement of intent, principles and approaches to ensure effective management of cybersecurity risks in pursuit of its strategic objectives.” (Definition of Cybersecurity Policies – Gartner Information Technology Glossary). By using the Short Arm of Predictive Knowledge, cybersecurity professionals can develop strong cybersecurity policies to help combat cyber criminals committing cyber crimes/cyber attacks. By constantly monitoring the cyber space to determine which cyber crime/cyber attacks are being committed the most, cybersecurity policies can be created to ensure that these malicious crimes are not executed onto an innocent online user.

Reference

Definition of Cybersecurity Policies – Gartner Information Technology Glossary. Gartner. (n.d.). https://www.gartner.com/en/information-technology/glossary/cybersecurity-policies

Leave a Reply

Your email address will not be published. Required fields are marked *