{"id":1013,"date":"2023-11-21T02:44:30","date_gmt":"2023-11-21T02:44:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/carolinebutler\/?p=1013"},"modified":"2023-11-21T02:45:37","modified_gmt":"2023-11-21T02:45:37","slug":"the-short-arm-of-predictive-knowledge","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/carolinebutler\/2023\/11\/21\/the-short-arm-of-predictive-knowledge\/","title":{"rendered":"The Short Arm of Predictive Knowledge"},"content":{"rendered":"\n<p><br>Discussion Board Question: From this week\u2019s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/p>\n\n\n\n<p>I believe it is essential to constantly modify the development of cyber policies and infrastructure using the Short Arm of Predictive Knowledge. There is no way to determine the future of the cyberspace. There are constant advancements with technology in today\u2019s world. Different cyber crimes\/cyber attacks can be committed everyday. Cyber crimes\/cyber attacks that can be committed consist of identity theft, phishing attacks, terrorism, data breaches, viruses, malware, etc. It is hard to predict which cyber crimes\/cyber attacks are going to be executed onto innocent online users. The development of cyber policies and infrastructure need to be constantly updated due to the uncertainty of which cyber crimes and cyber attacks are going to be executed, the severity of these cyber crimes and cyber attacks, and the uncertain future of the cyberspace. A cybersecurity policy consists of guidelines and principles that are intertwined into a policy to ensure that a company\u2019s employees know how to react when there is a cyber crime\/cyber attack taking place. According to Gartner, \u201cA cybersecurity policy defines and documents an organization\u2019s statement of intent, principles and approaches to ensure effective management of cybersecurity risks in pursuit of its strategic objectives.\u201d (<em>Definition of Cybersecurity Policies \u2013 Gartner Information Technology Glossary<\/em>). By using the Short Arm of Predictive Knowledge, cybersecurity professionals can develop strong cybersecurity policies to help combat cyber criminals committing cyber crimes\/cyber attacks. By constantly monitoring the cyber space to determine which cyber crime\/cyber attacks are being committed the most, cybersecurity policies can be created to ensure that these malicious crimes are not executed onto an innocent online user.<\/p>\n\n\n\n<p class=\"has-text-align-center\">Reference<\/p>\n\n\n\n<p><em>Definition of Cybersecurity Policies \u2013 Gartner Information Technology Glossary<\/em>. Gartner. (n.d.). https:\/\/www.gartner.com\/en\/information-technology\/glossary\/cybersecurity-policies<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discussion Board Question: From this week\u2019s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge? I believe it is essential to constantly modify the development of cyber policies and infrastructure using the Short Arm of Predictive Knowledge. There is no way to determine the future&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/carolinebutler\/2023\/11\/21\/the-short-arm-of-predictive-knowledge\/\">Read More<\/a><\/div>\n","protected":false},"author":27177,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/posts\/1013"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/users\/27177"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/comments?post=1013"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/posts\/1013\/revisions"}],"predecessor-version":[{"id":1016,"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/posts\/1013\/revisions\/1016"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/media?parent=1013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/categories?post=1013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carolinebutler\/wp-json\/wp\/v2\/tags?post=1013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}