{"id":316,"date":"2023-12-08T01:32:16","date_gmt":"2023-12-08T01:32:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/smsradt002\/?p=316"},"modified":"2023-12-08T01:32:16","modified_gmt":"2023-12-08T01:32:16","slug":"approach-to-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/smsradt002\/2023\/12\/08\/approach-to-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge\/","title":{"rendered":"Approach to the Development of Cyber-policy and -infrastructure Given the \u201cshort arm\u201d of Predictive Knowledge?"},"content":{"rendered":"\n<p>Given the \u201cshort arm\u201d of predictive knowledge, we should approach the development of cyber-policy and cyber-infrastructure as a two-step ahead method. Instead of being reactive to every situation, all communities and partnerships involved in and affected by cyber issues should be proactive in understanding that if the current situation dictates that there is a need for better security at the point of introduction, then in two or three years, there will be a need to protect assets at a much higher level. This means that the current state of cybersecurity should be at the point necessitated two or three years from now. In the future, cybersecurity should be operating at the point that encompasses the near-sighted analytics and theoretical behaviors and problems that could arise given the advancement in technology and human evolution. Regarding technology, Roser, et al. state that Moore\u2019s Law has held true for more than half a century\u201d(2023). This means that processing speed and capacity have increased at a known rate for fifty years. It is doubtful that this will decrease in the future given there are no catastrophic events that limit mankind. Gibbons makes the point that scientists realize that \u201chumans are evolving 100 times faster in the last 5000 years\u201d (2007). This fact as researched by scientists, combined with the fact that Moore\u2019s Law is still following the predicted path, should be enough to realize that more than predictive knowledge is necessary to accomplish adequate cybersecurity.<\/p>\n\n\n\n<p>Predictive knowledge should be a starting point for cybersecurity programs, not the entire package. If a business is focusing on the here-and-now point of view, then there is little cybersecurity.&nbsp;<em>McKinsey<\/em>, (2017) points out that companies may well be reactive to the cyber threat by continuously updating the programs\u2019 budgets without fully understanding the program and threats. This can cause chaos in the cybersecurity program and lead to an incident. The goal should be to even out the reactions of upper management by helping them to understand the cyber landscape which can help to stabilize the reactions to current events. This will help to mitigate future issues.<\/p>\n\n\n\n<p>Using predictive analytics can help organizations of all sorts to continually protect the personal data of people who rely on those institutions. Using predictive analytics can provide current types of attacks, as well as current targets. That data can be used by the conglomerate of working professionals to devise a plan of defense based on theoretical information combined with the current factual data set. Using predictive knowledge as the sole basis of a cybersecurity plan is the equivalent of basic evolution in nature. Humans are supposed to be beyond that point now. Therefore, the only short-sightedness is that of one who doesn\u2019t care about or understand cybersecurity.<\/p>\n\n\n\n<p>Gibbons, A.,<em> Human Evolution Is Speeding Up<\/em>. (2007). Www.science.org. https:\/\/www.science.org\/content\/article\/human-evolution-speeding<\/p>\n\n\n\n<p><em>Hit or myth? Understanding the true costs and impact of cybersecurity programs | McKinsey<\/em>. (2017). Www.mckinsey.com. <a href=\"https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/hit-or-myth-understanding-the-true-costs-and-impact-of-cybersecurity-programs\">https:\/\/www.mckinsey.com\/capabilities\/mckinsey-digital\/our-insights\/hit-or-myth-understanding-the-true-costs-and-impact-of-cybersecurity-programs<\/a><\/p>\n\n\n\n<p>Roser, M., Ritchie, H., &amp; Mathieu, E. (2023, March 28).&nbsp;<em>What is Moore\u2019s Law?<\/em>&nbsp;Our World in Data. https:\/\/ourworldindata.org\/moores-law<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given the \u201cshort arm\u201d of predictive knowledge, we should approach the development of cyber-policy and cyber-infrastructure as a two-step ahead method. Instead of being reactive to every situation, all communities and partnerships involved in and affected by cyber issues should be proactive in understanding that if the current situation dictates that there is a need&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/smsradt002\/2023\/12\/08\/approach-to-the-development-of-cyber-policy-and-infrastructure-given-the-short-arm-of-predictive-knowledge\/\">Read More<\/a><\/div>\n","protected":false},"author":27260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/posts\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/users\/27260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/posts\/316\/revisions\/317"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/smsradt002\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}