{"id":304,"date":"2024-11-18T03:58:43","date_gmt":"2024-11-18T03:58:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/?page_id=304"},"modified":"2024-11-18T04:08:29","modified_gmt":"2024-11-18T04:08:29","slug":"journal-3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/it-cyse-200t-2\/journal-3\/","title":{"rendered":"Journal #3"},"content":{"rendered":"\n<p>09\/17\/24<\/p>\n\n\n\n<p>Journal #3<\/p>\n\n\n\n<p>Lanwood Lynch III<\/p>\n\n\n\n<p>This journal entry this week is interesting with the break down of breaches across the United States. These sites calculations can help researchers study breaches a number of ways. First thing I noticed with a quick look is you see which states are hit the hardest from years ago to now. It allows you to see what breach types are hot now and what isn\u2019t as much of a worry. From there you can follow trends pinpoint where someone may possibly be hitting next if there is a pattern. The limits this could reach are endless. I did read at the bottom of the charts they are working on developing methods to better identify duplicate breach entries as well. Obviously, this won\u2019t ever be 100% accurate but it is better than having nothing. All in all, cool tool to just keep an eye on and use for real world scenarios.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-b1ad6d34-a76b-4f55-bf06-de7b54661c49\" href=\"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-content\/uploads\/sites\/37232\/2024\/11\/Journal-3.docx\">Journal-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-content\/uploads\/sites\/37232\/2024\/11\/Journal-3.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b1ad6d34-a76b-4f55-bf06-de7b54661c49\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>09\/17\/24 Journal #3 Lanwood Lynch III This journal entry this week is interesting with the break down of breaches across the United States. These sites calculations can help researchers study breaches a number of ways. First thing I noticed with a quick look is you see which states are hit the hardest from years ago&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/it-cyse-200t-2\/journal-3\/\">Read More<\/a><\/div>\n","protected":false},"author":29730,"featured_media":0,"parent":133,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/pages\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/users\/29730"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/pages\/304\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/pages\/304\/revisions\/306"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/pages\/133"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lanwoodlynch\/wp-json\/wp\/v2\/media?parent=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}