There are many factors that go into studying data breaches. Many data breaches are publicly available to see, researchers can use this information to study and gain knowledge from this. The researchers use this public information to study data breaches by analyzing the patterns and the trends that happened to the breaches over time. Thay may also use this information to identify the types of data and information that are most commonly stolen and the industries that are going to be most vulnerable to an attack. This information that is publicly shared can help researchers develop a strategy to prevent the breaches from happening and mitigate their impact. In my opinion, seeing all the breaches publicly does increase our way to gain knowledge and stop an attack from being done, but it can also help the people committing these attacks to learn different ways that will go unnoticed. We must stay vigilant and develop new security practices so information is better secured.

References

Data Breach Chronology. Data Breach Chronology | Privacy Rights Clearinghouse. (n.d.). https://privacyrights.org/data-breaches