CYSE 201S Journal Entry #3

CYSE 201S Journal Entry #3 

Matthew Burd

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches?
Note: The word count should be in between 100 -125 words.

One of the Publicly accessible methods I found was about Data Breach Chronology. The Data Breach Chronology can help researchers examine breaches by examining trends over time, discovering patterns in the number and form of breaches, and determining how different industries are affected. Researchers can determine which sectors are most vulnerable to specific types of attacks and the underlying vulnerabilities that make them targets by examining the classifications for breach types (e.g., HACK for cyberattacks or PORT for portable device breaches) and organization types (e.g., BSF for financial services or MED for healthcare). This research can assist assess the possible impact of breaches on diverse firms, as different sectors face variable amounts of privacy and financial ramifications. (119 Words)

Leave a Reply

Your email address will not be published. Required fields are marked *