{"id":311,"date":"2023-04-19T01:29:20","date_gmt":"2023-04-19T01:29:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ilope006\/?p=311"},"modified":"2023-04-24T03:00:15","modified_gmt":"2023-04-24T03:00:15","slug":"journal-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ilope006\/2023\/04\/19\/journal-13\/","title":{"rendered":"Journal 13"},"content":{"rendered":"\n<p><strong>How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/strong><\/p>\n\n\n\n<p>The development of cyber-policy and infrastructure is a complicated and evolving process as time goes on, and the &#8220;short arm&#8221; of predictive knowledge makes it harder to predict and prevent all possible cyber threats. <\/p>\n\n\n\n<p>Given the constantly evolving nature of cyber threats, it is important to develop policies and infrastructure that are flexible and adaptable to changing circumstances. This can include investing in technologies and processes that can quickly detect and respond to cyber threats, and creating policies that can be updated and revised as needed. Working with professionals from all fields like computer science, criminology, and business allows ideas from multiple perspectives to increase adaptability to threats.<\/p>\n\n\n\n<p>Cyber threats are often a problem for multiple companies and countries, they can impact multiple organizations and industries. To take care of this, it is important to increase collaboration and sharing information between different stakeholders including governments, businesses, and civil society groups. Sharing between both shortfalls and successes with other companies can be beneficial for both parties because they learn from their mistakes while also looking ahead. This can help to improve situational awareness and enable a more coordinated response to cyber threats. <\/p>\n\n\n\n<p>To address the &#8220;short arm&#8221; of predictive knowledge, it is important to invest in research and development of new technologies and approaches to cybersecurity. This can include funding research into emerging threats and vulnerabilities, as well as developing new tools and techniques for cybersecurity. Being at the frontline of new technologies is very important because it will provide a competitive advantage that ties with communication. If one company develops a new system or defensive strategy it is crucial for them to  communicate with others to improve on or expand said product.<\/p>\n\n\n\n<p>Because of the limitations of predictive knowledge, it is important to develop a risk-based approach to cybersecurity. This can involve assessing the potential impact of different cyber threats, prioritizing resources based on the level of risk, and developing policies and infrastructure that can mitigate these risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge? The development of cyber-policy and infrastructure is a complicated and evolving process as time goes on, and the &#8220;short arm&#8221; of predictive knowledge makes it harder to predict and prevent all possible cyber threats. Given the constantly evolving&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ilope006\/2023\/04\/19\/journal-13\/\">Read More<\/a><\/div>\n","protected":false},"author":25944,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/posts\/311"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/users\/25944"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/posts\/311\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ilope006\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}