Journal Entry 2

Module 3

Visit PrivacyRights.org to see the types of publicly available information
about data breaches. How might researchers use this information to
study breaches? Enter a paragraph in your journal.

Researchers can use this cite to see and do research on different types of breaches. They can also see the different types of breaches to help out with research. Researchers can also disign different practices and trainings for cybersecurity personal to help them learn and train to be more aware of these breaches and learn how to shut down the breach.

Leave a Reply

Your email address will not be published. Required fields are marked *