{"id":58,"date":"2023-12-03T18:39:28","date_gmt":"2023-12-03T18:39:28","guid":{"rendered":"https:\/\/student.wp.odu.edu\/hkhan004\/?p=58"},"modified":"2023-12-03T18:39:28","modified_gmt":"2023-12-03T18:39:28","slug":"eportfolio-entry-13","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/hkhan004\/2023\/12\/03\/eportfolio-entry-13\/","title":{"rendered":"ePortfolio entry 13"},"content":{"rendered":"\n<p>When it comes to developing cyber policies and infrastructure with limited predictive knowledge, analysts must be strategic and adaptable to be able to react in any type of situation. There are a few ways that can help approach this scenario.<\/p>\n\n\n\n<ol>\n<li>Push continued education: Cyber threats are never the same and the world of technology is evolving more and more as everyday goes by. This makes it crucial for users to stay uptodate and educated on all updates a changes being made in the world of cybersecurity. By investing some time into creating a strong continued education program, we can help all analyst stay up tp date with all the updates and changes being made. This will help understand new emerging risks and develop stronger and updated policies.<\/li>\n\n\n\n<li>Emphasize Colloborations: Cybersecurity is very much like a team sport. involving full blown teams, agencies, private organizations, etc. By promoting collaboration sharing, we can bring more educated brains together and collect all the resources needed to create stronger and more ribust policies and infrastructure.<\/li>\n\n\n\n<li>Focus highly on risk assessments: Conducting thorough risk assessments helps identify vulnerbilities and potential threats. By having a stronger understanfdding of these risks and vulner bilities, it can help create stronger protocols and and policies to be able to prevent them from causing too much harm. <\/li>\n<\/ol>\n\n\n\n<p>These are just a few of many ways to approach cyber policies and infrastructure to ensure a strong developement of the cyber infrastructure. <\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>When it comes to developing cyber policies and infrastructure with limited predictive knowledge, analysts must be strategic and adaptable to be able to react in any type of situation. There are a few ways that can help approach this scenario. These are just a few of many ways to approach cyber policies and infrastructure to [&hellip;]<\/p>\n","protected":false},"author":27219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/58"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/users\/27219"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/58\/revisions"}],"predecessor-version":[{"id":59,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/58\/revisions\/59"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}