Researchers can use the publicly available information on websites such as PrivacyRights.org to study data breaches. Researchers can utilize this publicly available information in various ways such as for risk assessment, as the breach data can be utilized to assess the method used to breach the network, the type of data that was compromised, and the vulnerability that was exploited to help identify critical risks that could help inform other organizations potentially vulnerable to a similar attack. In the same vain this information could also be used to help shape detection and prevention strategies being able to quantitively review either the most common attack vectors or the most successful attack vectors.
Leave a Reply