Journal 3

Researchers might use the data to study the patterns in security breaches. The patterns used can indicate how the hackers are able to breach the system security. Once the pattern is discovered the security can be updated and secured appropriately. Researchers can also determine the trend of the security breaches. If similar businesses experience security breaches around the same time, the breaches might be connected to the same group. If it is determined to be the same group committing these attacks the researchers can determine their method used to commit the breach. Once the method is discovered researchers can better equip a security system to be prepared for those kinds of attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *