{"id":279,"date":"2023-01-23T03:03:45","date_gmt":"2023-01-23T03:03:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/?p=279"},"modified":"2023-01-26T17:21:53","modified_gmt":"2023-01-26T17:21:53","slug":"journal-entry-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/2023\/01\/23\/journal-entry-3\/","title":{"rendered":"Journal Entry #3"},"content":{"rendered":"\n<p class=\"has-vivid-red-color has-text-color\">Visit PrivacyRights.org to see the types of publicly available information<br>about data breaches. How might researchers use this information to<br>study breaches? Enter a paragraph in your journal.<\/p>\n\n\n\n<p>After reviewing the website one can look over the different type of breaches and use that to their advantage. It is important to stay aware of breaches when researching cybersecurity in order to successfully have safe cyber practices. Knowing the different breaches can be beneficial to protecting your own information. Researching cybersecurity is important to helping reduce cyber crime in the future. Surveys and experiments are vital to this research as cybersecurity directly relates to human behavior. Monitoring different types of breaches, for example: physical, card, or insider and also monitoring the behavior that takes places during the breach is a type of research that is beneficial to the study.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. After reviewing the website one can look over the different type of breaches and use that to their advantage. It is important to stay aware of breaches when researching&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kyiellethomas\/2023\/01\/23\/journal-entry-3\/\">Read More<\/a><\/div>\n","protected":false},"author":16379,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/posts\/279"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/users\/16379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/posts\/279\/revisions\/280"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kyiellethomas\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}