ODU Logo

Niaya Fuller

Cybersecurity Major

  • About Me
    • Resume
    • Professional Goals
    • Program Reflection
  • CYSE 201S
    • Journal Entry 1
    • Journal Entry 2
    • Journal Entry 3
    • Journal Entry 4
    • Journal Entry 5
    • Journal Entry 6
    • Journal Entry 7
    • Journal Entry 8
    • Journal Entry 9
    • Journal Entry 10
    • Journal Entry 11
    • Journal Entry 12
    • Journal Entry 13
    • Journal Entry 14
    • Journal Entry 15
  • CYSE 270
    • Lab 1
    • Lab 2
    • Lab 3
    • Lab 4
    • Lab 5
    • Lab 6
    • Lab 7
    • Lab 8
    • Lab 9
    • Lab 10
    • Lab 11
  • Cybersecurity and Social Sciences
    • Cybersecurity Professional Career Paper
    • My thoughts on Cybersecurity
    • Article Reviews
      • Review #1
      • Review #2
  • CYSE 200
    • Malicious Code
    • Ethical Considerations of CRISPR Gene Editing
    • Opportunities for Workplace Deviance
  • About Me
    • Resume
    • Professional Goals
    • Program Reflection
  • CYSE 201S
    • Journal Entry 1
    • Journal Entry 2
    • Journal Entry 3
    • Journal Entry 4
    • Journal Entry 5
    • Journal Entry 6
    • Journal Entry 7
    • Journal Entry 8
    • Journal Entry 9
    • Journal Entry 10
    • Journal Entry 11
    • Journal Entry 12
    • Journal Entry 13
    • Journal Entry 14
    • Journal Entry 15
  • CYSE 270
    • Lab 1
    • Lab 2
    • Lab 3
    • Lab 4
    • Lab 5
    • Lab 6
    • Lab 7
    • Lab 8
    • Lab 9
    • Lab 10
    • Lab 11
  • Cybersecurity and Social Sciences
    • Cybersecurity Professional Career Paper
    • My thoughts on Cybersecurity
    • Article Reviews
      • Review #1
      • Review #2
  • CYSE 200
    • Malicious Code
    • Ethical Considerations of CRISPR Gene Editing
    • Opportunities for Workplace Deviance

Journal Entry 3

Prompt: Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches and forecast future data breach trends ?

PrivacyRights.org has a lot of different information that can be used by researchers. The information that is available is which states report, the types of breaches, what organizations are targeted, and more. It even has a section to explain what types of information is being targeted for these breaches. This information is very helpful for researchers to pinpoint specific states and what types of breaches are occurring there. Using California as an example, the website shows that California has the most (reported) breaches. From there, the researchers are able to pinpoint which institutions are targeted, and what information is accessed the most. That can lead to predictions being made on breaches, and it even has the months available so they are able to possibly predict the most likely month for breaches to occur.

Welcome to my E-Portfolio!

Thank you for visiting my portfolio!

© 2026 Niaya Fuller — Powered by WordPress

Original theme by Anders Noren | Adapted by ITS — Up ↑

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept