{"id":297,"date":"2023-01-22T23:29:26","date_gmt":"2023-01-22T23:29:26","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nflor010\/?p=297"},"modified":"2023-01-24T18:36:55","modified_gmt":"2023-01-24T18:36:55","slug":"journal-3","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nflor010\/2023\/01\/22\/journal-3\/","title":{"rendered":"Journal #3"},"content":{"rendered":"\n<p>Visit PrivacyRights.org to see the types of publicly available information<br>about data breaches. How might researchers use this information to<br>study breaches? Enter a paragraph in your journal.<\/p>\n\n\n\n<p>Researchers use various information sources such as breach data, vulnerability data, attack data, survey data, and log data to study breaches and understand the factors that contribute to them. By analyzing this information, researchers can identify trends and patterns in breaches, and use that information to develop new security techniques, tools, and strategies to prevent future breaches.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visit PrivacyRights.org to see the types of publicly available informationabout data breaches. How might researchers use this information tostudy breaches? Enter a paragraph in your journal. Researchers use various information sources such as breach data, vulnerability data, attack data, survey&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/nflor010\/2023\/01\/22\/journal-3\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25862,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/users\/25862"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/posts\/297\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nflor010\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}