{"id":296,"date":"2024-02-02T23:40:15","date_gmt":"2024-02-02T23:40:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jpegu001\/?p=296"},"modified":"2024-02-02T23:40:48","modified_gmt":"2024-02-02T23:40:48","slug":"journal-entry-03-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jpegu001\/2024\/02\/02\/journal-entry-03-2\/","title":{"rendered":"Journal Entry 03"},"content":{"rendered":"\n<p><strong>Importance of data breach research:<\/strong><\/p>\n\n\n\n<p>It is of critical importance to report and research breach data for a number of reasons. Some of the most crucial being: identifying immediate vulnerabilities and weakness, threat intelligence, risk assessment, awareness, etc. Data breach research will help cybersecurity measures improve and remain adaptive as we move through a constantly progressing digital age.<\/p>\n\n\n\n<p>If an organization evaluates reports effectively, there is a greater opportunity to patch these vulnerabilities and use security approaches that reduce these risks. If there are successful cyber attacks against a network, a report may show the areas for improvement and give a greater insight in what can be done to prevent and patch the exploits. This is where cyber experts come into play with improved coding\/programming, advanced security measures, and preventative action.<\/p>\n\n\n\n<p>Based on the results of any report, there is a greater knowledge on many things such as the current effectiveness of the security policies and even the training of cyber and individual personnel. Preventing and minimizing risk, in regards to data breaches, is one of the main goals of cyber experts. It important that these experts are reviewing and identifying the issues with their policies and  network privacy\/security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Importance of data breach research: It is of critical importance to report and research breach data for a number of reasons. Some of the most crucial being: identifying immediate vulnerabilities and weakness, threat intelligence, risk assessment, awareness, etc. Data breach research will help cybersecurity measures improve and remain adaptive as we move through a constantly&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jpegu001\/2024\/02\/02\/journal-entry-03-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28192,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/users\/28192"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":338,"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/posts\/296\/revisions\/338"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpegu001\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}