{"id":320,"date":"2024-04-23T03:20:26","date_gmt":"2024-04-23T03:20:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/?p=320"},"modified":"2024-04-23T03:20:26","modified_gmt":"2024-04-23T03:20:26","slug":"journal-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/2024\/04\/23\/journal-13\/","title":{"rendered":"Journal #13"},"content":{"rendered":"\n<p><strong>How should we approach the development of cyber-policy and -infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/strong><\/p>\n\n\n\n<p>We should approach the development of cyber-policy and -infrastructure in a proactive and adaptive approach given the &#8220;short arm&#8221; of predictive knowledge. This &#8220;short arm&#8221; of predictive knowledge is due to the rapidly evolving field of cybersecurity. A few strategies that can be used to approach this difficulty are risk-based approach, flexible approach, and collaborative approach.<\/p>\n\n\n\n<p>A risk-based approach should be taken to address the continuous evolution of the field of cybersecurity. Instead of trying to predict possible cyber-threats, we should focus on identifying the most important risks to critical systems. We should conduct regular risk assessments, gather intelligence on threats, and plan countermeasures to inform policy decisions. <\/p>\n\n\n\n<p>We should also take a flexible approach when approaching the development of cyber-policy and -infrastructure. A flexible approach makes it possible for cyber-policies to adapt to emerging threats and technological evolution in a timely manner.  A traditional approaches may not be able to keep up with the rapid evolution of cyber threats. Therefore if we keep a flexible approach we can continuously monitor, evaluate, and adjust cyber-policies and -infrastructures accordingly.<\/p>\n\n\n\n<p>Collaboration and partnerships should also be implemented when addressing the development of cyber-policies and -infrastructure. Partnerships between government agencies, private sector stakeholders, and other communities would promote collaboration and collective action in addressing cyber threats. Cybersecurity is a huge responsibility that requires coordinated action across multiple sectors and stakeholders.<\/p>\n\n\n\n<p>Collaborative approach does not only apply within a singular country. International cooperation needs to be strengthened in order to approach the development of cyber-policies and -infrastructure. Being that cyber threats are a worldwide threat, coordinated action at the global level is required. <\/p>\n\n\n\n<p>In conclusion, by implementing these strategies, policymakers and cybersecurity professionals can address the challenges of the &#8220;short arm&#8221; of predictive knowledge. They can then develop effective cyber-policies and -infrastructure that adapt to evolving cyber threats and technological advancements.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How should we approach the development of cyber-policy and -infrastructure given the \u201cshort arm\u201d of predictive knowledge? We should approach the development of cyber-policy and -infrastructure in a proactive and adaptive approach given the &#8220;short arm&#8221; of predictive knowledge. This &#8220;short arm&#8221; of predictive knowledge is due to the rapidly evolving field of cybersecurity. A&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/2024\/04\/23\/journal-13\/\">Read More<\/a><\/div>\n","protected":false},"author":28263,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/posts\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/users\/28263"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"predecessor-version":[{"id":321,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/posts\/320\/revisions\/321"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-aboyd018\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}