Week 3 – Journal Entry 3

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

After a look at the website, PrivacyRights.org, the way researchers can use this information to study breaches is evident. To begin, breach patterns. Researches can break down and examine the publicity available information about data breaches for identifying patterns and trends. The analysis can include the industries most affected, the scale of the breaches, and common attack methods. Next is identification of vulnerabilities, through the act of studying each breach, researches can identify the most common vulnerabilities exploited by attackers. This brings about improving cybersecurity measures and developing better defensives against certain attacks. Next, understanding the impact of the users. With the data breach, researches can see certain types of information exposed, the potential consequences for the affected individuals, and overall the financial and reputational damage done. Then, comparative studies can also be done to analyze how certain companies react and recover from data breaches. Then there is legal and regulatory compliance, a predictive analysis, and public awareness and education. Many more but these are just a few of the man ways that researches would use this information to study breaches.

Leave a Reply

Your email address will not be published. Required fields are marked *