{"id":307,"date":"2023-04-18T17:02:46","date_gmt":"2023-04-18T17:02:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pasan001\/?p=307"},"modified":"2023-04-18T17:02:46","modified_gmt":"2023-04-18T17:02:46","slug":"journal-entry-13","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/pasan001\/2023\/04\/18\/journal-entry-13\/","title":{"rendered":"Journal Entry #13"},"content":{"rendered":"\n<p>Given the short arm of predictive knowledge, the best approach to developing cyber-policy and infrastructure is to create a layered approach that focuses on prevention, detection, and response. Prevention should involve measures such as strong authentication, encryption, patching, and secure network configurations. Detection should involve measures such as logging and monitoring, vulnerability scanning, and intrusion detection. Response should involve measures such as incident response plans, incident response teams, and active defense. Additionally, organizations should use threat intelligence to identify and monitor emerging threats and vulnerabilities in order to anticipate and mitigate cyber-attacks. Finally, organizations should create clear and concise policies and procedures that address all aspects of cyber-security.<\/p>\n\n\n\n<p>Cyber policies are essential since they solve most of the coverage gaps in this area. Businesses need to sit down and review their policies and infrastructure now more than ever because cyber-attacks are increasing. In addition to having policy in place to help mitigate the damage, creating such plans is challenging because technology is always evolving. Aside from evolving, it&#8217;s a challenging subject to understand in general, especially for people who aren&#8217;t technically in the field. The evaluation of risks is also essential while developing these strategies. The value of client information is one of several factors that a business must take into account. How to get ready for an assault has a straightforward solution. Unfortunately, it is more a matter of when than whether an attack will take place. Because the organization is unlikely to be aware of their approaching presence, the majority of attacks will go unanticipated. The best you can do is to be fully prepared and then take lessons from an attack after it has already happened. Having regulations in place to help with that would be another excellent incentive as the costs of these assaults and breaches rise yearly. In general, creating policies for a subject where things are constantly changing and we can&#8217;t know for sure what will happen until it has already happened is quite difficult. There are several things to keep in mind when trying to implement such rules and infrastructure. Given the prevalence and expense of cyberattacks nowadays, every company must take cyber policies into account.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given the short arm of predictive knowledge, the best approach to developing cyber-policy and infrastructure is to create a layered approach that focuses on prevention, detection, and response. Prevention should involve measures such as strong authentication, encryption, patching, and secure network configurations. Detection should involve measures such as logging and monitoring, vulnerability scanning, and intrusion&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pasan001\/2023\/04\/18\/journal-entry-13\/\">Read More<\/a><\/div>\n","protected":false},"author":25759,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/users\/25759"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/307\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/posts\/307\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/media?parent=307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/categories?post=307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pasan001\/wp-json\/wp\/v2\/tags?post=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}