According to PrivacyRights.org there are 8 types of breaches. Those breaches include card, hack, insider, physical, portable device, stationary computer loss, unintended disclosure , and unknown. A researcher might use the information that we have on these eight breaches to first figure out what type of breach it was. From there they can figure out what was the weak spot and then see how to prevent it from happening in the future. This research could help prevent further breaches because researchers would know what to look out for.
Leave a Reply