Mod 3 Entry

The strategies of studying cybersecurity can rely on the research methods of social science. The methods include surveys, experiments, archival research, field studies, and multimethod research.  According to the downloaded data, researchers should use archival research to process the achieved data. The breached data is in various business fields, including the BSF (Financial and Insurance Services), BSR (Retail/Merchant including Online Retail), EDU Educational Institutions, government and military, MED(Healthcare, Medical Providers and Medical Insurance Services), and so on. Also, the causes of breaching data are varied and include credit/ debit card fraud, physical device loss or stolen, hacking by hackers, insiders, and so on. Researchers can sort all the data into different fields or types of data breaches, then analyze the data details to create the methods to reduce breach risk or create cybersecurity policies.