Journal Entry 3

How might researchers use this information to study breaches?

Researchers might use this information to see how the technologies are being breached in different ways. They can use this information to study and be aware of new patterns of attacks different kind of tech industry. By being aware of this information researchers can see what kind of attacks took place, how they took place and because of what vulnerability they took place. By doing these they can work on improving and pathing the vulnerabilities to help future attacks through the same vulnerability. Also, by studying these information researchers can help others around them be aware of the attacks and teach them how to be safe.