{"id":372,"date":"2024-12-07T20:15:12","date_gmt":"2024-12-07T20:15:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/?p=372"},"modified":"2024-12-07T20:15:12","modified_gmt":"2024-12-07T20:15:12","slug":"week-3-journal-entry-3-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/07\/week-3-journal-entry-3-2\/","title":{"rendered":"Week 3 &#8211; Journal Entry 3"},"content":{"rendered":"\n<p>Sites like PrivacyRights.org provide an abundance of information on<br>data breaches, and researchers can derive new insights from public data<br>regarding data breaches. Many of the reported data breaches are<br>categorized by the malicious techniques used, the location of the breach, as<br>well as the industry type it occurred in. As of 2023, the year of the last<br>reported breaches, the states with the highest number of breached entities<br>are California, Indiana, Massachusetts, Texas, and Maryland. Based on public<br>data, financial organizations, hospitals and medical related organizations,<br>and insurance companies are the most impacted industries to be targeted by<br>a cyber-attack. A common trend about these data breaches is that they<br>involved some form of hacking into the organization\u2019s network. Thus,<br>researchers can study patterns of what industries have the most incidents of<br>breach and whether users\u2019 confidential data has been compromised.<br>Furthermore, most attacks had little to no impact on users\u2019 confidential data.<br>Regarding users\u2019 confidential data, threat actors had the tendency to hold<br>such information hostage by encrypting it in industries like medical<br>organizations. By understanding the types of malicious techniques used to<br>breach company data, researchers can better understand the motives of<br>these attacks and identify the most suitable measures to counter these<br>cyber-attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sites like PrivacyRights.org provide an abundance of information ondata breaches, and researchers can derive new insights from public dataregarding data breaches. Many of the reported data breaches arecategorized by the malicious techniques used, the location of the breach, aswell as the industry type it occurred in. As of 2023, the year of the lastreported breaches,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/07\/week-3-journal-entry-3-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29388,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/372"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/users\/29388"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/comments?post=372"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/372\/revisions"}],"predecessor-version":[{"id":373,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/372\/revisions\/373"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/media?parent=372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/categories?post=372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/tags?post=372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}