Ahmed Kargbo
CYSE 201S
Data Breaches
After reading about Data Breaches on PrivacyRights.org, I learned that data breaches are inevitable, and it is best for technology professionals to always be prepped and ready with a plan. Researchers use information such as the number of breaches occurred, the type of breaches that occurred and the time of occurrence to study, predict and prepare for breaches. It is best to develop a well schemed incident response in the case of a breach because data breaches are inevitable. To study future breaches researchers, pay attention to details such as pattern recognition to identify commonalities. In collaboration with a good incident response team, researchers also implement viable threat models. The threat models simulate attack scenarios and help professionals identify possible threats and come up with defense strategies.