Module 3 Journal Entry

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

Researchers can use this information to analyze the frequency of different types of breaches over time. They could extrapolate the risk of insiders versus employees who make genuine mistakes. The database also includes information on breaches by portable and non-portable computers. They can also see trends in these categories for different types of businesses/organizations.

Leave a Reply

Your email address will not be published. Required fields are marked *