{"id":291,"date":"2025-02-03T04:54:28","date_gmt":"2025-02-03T04:54:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/?p=291"},"modified":"2025-02-03T04:55:48","modified_gmt":"2025-02-03T04:55:48","slug":"week-3-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/02\/03\/week-3-journal-entry\/","title":{"rendered":"Week 3 Journal Entry"},"content":{"rendered":"\n<p>Visit\u00a0<a href=\"https:\/\/privacyrights.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">PrivacyRights.org.<\/a>\u00a0to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches? Enter a paragraph in your journal.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Researchers can use this information to better educate themselves with information on over 70,000 incidents. This database updates monthly, which will provide updated information, as well as observe trends to determine what breaches are occurring the most, how many people were impacted, etc. This also allows researchers to examine data across different sectors (ex: health care and retail), and where most breaches occur geographically. Together, this can help mitigate cyber-attacks and help implement laws to better protect sensitive information. Allowing researchers, and the public to have access to this information will also show where there are vulnerabilities in security, and help be able to strengthen them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visit\u00a0PrivacyRights.org.\u00a0to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches? Enter a paragraph in your journal. Researchers can use this information to better educate themselves with information on over 70,000 incidents. This database updates monthly, which will provide updated information, as well as observe trends to determine what&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/2025\/02\/03\/week-3-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":30517,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/users\/30517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/posts\/291\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201s-indiap\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}