Journal Entry Three: Investigating Data Breaches with Available Information

As we can see from the data presented by PrivacyRights.org, the number of data breaches, and those affected, have decreased significantly since 2005. Researchers can utilize this public information to investigate data breaches by carefully analyzing the information that has been disclosed or leaked. This can include studying breached data sets, examining hacker forums, dark…

Journal Entry Two: Cybersecurity and The Principles of Science

In the twenty-first century, digital threats constantly evolve and security breaches are a common occurrence, these principles of relativism, determinism, parsimony, ethical neutrality, and objectivity play a significant role in shaping our approach to protecting digital arenas. Relativism reminds me of the importance of acknowledging the diverse cultural and ethical perspectives that influence cybersecurity. As…