Journal Entries

Journal Entry #3

When reviewing the privacy.org website, I believe researchers use this information to analyze the details surrounding specific cybersecurity incidents; inherently using this as a means to understand the vulnerabilities within a network. The research of the information provided not only mitigates reoccurrence, but also makes room for acknowledgment of the shortcomings established by the victims’ actions. This analysis then acts as continued education, affording researchers the opportunity to evolve, and align their mindset with the next possible threat.  This gives them the means to act in a proactive manner, possibly reducing the chances of certain patterns and behaviors from reoccurring.