{"id":295,"date":"2022-12-03T18:38:13","date_gmt":"2022-12-03T18:38:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/?p=295"},"modified":"2022-12-03T18:38:17","modified_gmt":"2022-12-03T18:38:17","slug":"how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/2022\/12\/03\/how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge\/","title":{"rendered":"How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?"},"content":{"rendered":"\n<p>I don&#8217;t think that the development of cyber policy should be weighed heavily on the use of predictive knowledge. Even tho it is good for projections it&#8217;s not entirely accurate all the time. This will make cyber policy development more reactive rather than proactive. When we start to over-predict things that&#8217;s when we over-correct things and start to fix things that don&#8217;t need to be fixed. I can agree with the use of predictive knowledge to an extent but, the overuse of it is when it can cause all of the problems. When using predictive knowledge as a stepping stone for the development of cyber-infrastructure it is a powerful tool.&nbsp;&nbsp;If we can analyze the types and trends of cyberattacks that are beginning to increase in frequency, we can understand the targets of cybercriminals.<\/p>\n\n\n\n<ul><li><a href=\"https:\/\/canvas.odu.edu\/courses\/116079\/discussion_topics\/418199#\"><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>I don&#8217;t think that the development of cyber policy should be weighed heavily on the use of predictive knowledge. Even tho it is good for projections it&#8217;s not entirely accurate all the time. This will make cyber policy development more reactive rather than proactive. When we start to over-predict things that&#8217;s when we over-correct things&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mikaelsykes\/2022\/12\/03\/how-should-we-approach-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge\/\">Read More<\/a><\/div>\n","protected":false},"author":24848,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/users\/24848"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/posts\/295\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mikaelsykes\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}