{"id":304,"date":"2024-12-10T18:32:34","date_gmt":"2024-12-10T18:32:34","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/?page_id=304"},"modified":"2024-12-11T04:09:52","modified_gmt":"2024-12-11T04:09:52","slug":"journal-entry-3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/journal-entry-3\/","title":{"rendered":"Journal Entry 3"},"content":{"rendered":"\n<p>Jahmeel Campbell<br>9\/16\/24<br>CYSE 201<br>Journal Entry #3<br><\/p>\n\n\n\n<p>Data from PrivacyRights.org, which offers thorough information on exposed data kinds, the<br>number of affected persons, and breach techniques such as insider threats or hacking, can be<br>used by researchers to conduct in-depth investigations of data breaches. Through the process of<br>classifying breaches based on industry, geography, and severity, particular vulnerabilities within<br>sectors or areas can be identified. This research can shed light on areas that require improvement<br>and provide insights into how successful current cybersecurity measures are. In addition,<br>longitudinal studies can monitor the evolution of data breaches and their consequences over time,<br>supporting assessments of the efficacy of legislative and regulatory actions. Researchers can also<br>investigate relationships between security policy implementation and personnel training as well<br>as other factors and breach instances. In the end, this thorough research raises public awareness<br>while guiding legislative and regulatory actions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jahmeel Campbell9\/16\/24CYSE 201Journal Entry #3 Data from PrivacyRights.org, which offers thorough information on exposed data kinds, thenumber of affected persons, and breach techniques such as insider threats or hacking, can beused by researchers to conduct in-depth investigations of data breaches. Through the process ofclassifying breaches based on industry, geography, and severity, particular vulnerabilities withinsectors or&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/journal-entry-3\/\">Read More<\/a><\/div>\n","protected":false},"author":29731,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/users\/29731"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/304\/revisions"}],"predecessor-version":[{"id":349,"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/pages\/304\/revisions\/349"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jahmeelcampbell\/wp-json\/wp\/v2\/media?parent=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}