CYSE 201S / Week 3 – Journal Entry

Cybersecurity and the Social Sciences (CYSE 201S)

Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Enter a paragraph in your journal.

Per PrivacyRights.org, there are many different types of information available about data breaches. In their database for Data Breach Notifications, you can find info about the Organization Name, Breach Type, Total People Affected, Residents Affected, Breach Location, and the Source of the breach. This information can be used in many ways. Data could be used to see if a specific “source” tends to use specific “breach types” or targets specific types of organizations more than others. This could also be used to see if specific breach types affect more or less people than other types. Additionally, this data could be used to see to see if breaches happen more or less during specific times of year. This data could be used in a variety of ways, even nefarious ways as you could see if specific organizations have more breaches, which would let you assume that their security is not a robust as others.

Leave a Reply

Your email address will not be published. Required fields are marked *