{"id":202,"date":"2024-09-19T02:45:18","date_gmt":"2024-09-19T02:45:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/?p=202"},"modified":"2024-09-19T03:29:47","modified_gmt":"2024-09-19T03:29:47","slug":"week-3-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/2024\/09\/19\/week-3-journal-entry\/","title":{"rendered":"WEEK 3: PRIVACYRIGHTS.ORG"},"content":{"rendered":"\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-3505cb86-de3a-4e36-b313-14ae9092642c\" href=\"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-content\/uploads\/sites\/37030\/2024\/09\/NIETO-CYSE-201S-WK-3-.docx\">NIETO-CYSE-201S-WK-3-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-content\/uploads\/sites\/37030\/2024\/09\/NIETO-CYSE-201S-WK-3-.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3505cb86-de3a-4e36-b313-14ae9092642c\">Download<\/a><\/div>\n\n\n\n<p><strong>Visit\u00a0PrivacyRights.org to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches?<\/strong><\/p>\n\n\n\n<p>By utilizing the data in PrivacyRights.org, researchers can analyze trends in data breaches by examining the frequency and severity of incidents over time, thus revealing patterns that highlight vulnerabilities across various industries. For instance, sectors like healthcare and finance often face higher rates of breaches due to the sensitive nature of the data they handle. By identifying common vulnerabilities such as inadequate encryption or outdated software. Researchers can further pinpoint areas where organizations need to strengthen their security measures. Furthermore, understanding the impact of these breaches on industries helps assess the broader economic and reputational consequences, enabling businesses to develop more effective risk management strategies and fostering a culture of enhanced data protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Visit\u00a0PrivacyRights.org to\u00a0see the types of publicly available information\u00a0about data breaches. How might researchers use this information to\u00a0study breaches? By utilizing the data in PrivacyRights.org, researchers can analyze trends in data breaches by examining the frequency and severity of incidents over time, thus revealing patterns that highlight vulnerabilities across various industries. For instance, sectors like healthcare&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nietocyse201s\/2024\/09\/19\/week-3-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":25891,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/202"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/users\/25891"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/202\/revisions"}],"predecessor-version":[{"id":229,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/posts\/202\/revisions\/229"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/media?parent=202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/categories?post=202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nietocyse201s\/wp-json\/wp\/v2\/tags?post=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}