Popular repositories Loading
-
May-Honey-Encryption-Ruin-The-Hacker-s-Honeymoon-
May-Honey-Encryption-Ruin-The-Hacker-s-Honeymoon- PublicIn this project, I introduce a data breach that occurred for Adidas in 2018. The hacker claimed that he gained access to a vast amount of customers’ confidential data stored on the database of Adid…
-
Security-Operating-Center-The-Solution-of-the-Corporation-Level-Business
Security-Operating-Center-The-Solution-of-the-Corporation-Level-Business PublicFirstly, I introduce the data breach exploited on MyFitnessPal, Under Armour’s fitness application in 2018. This data breach impacted 150 million customers’ account information including usernames …
-
Federal-law-and-the-issue-of-data-sovereignty
Federal-law-and-the-issue-of-data-sovereignty PublicThe long Iist of data breach shows how Federal law plays important role in data sovereignty. FTC has brought over 500 suits related to consumer information privacy against IT giants such as Google,…
-
Data-analysis-on-quality-of-wine
Data-analysis-on-quality-of-wine PublicIn this project, I performed the multiple statistical analysis in the following steps: - performing descriptive data analysis on all wine samples by use of histogram, bar charts, box plots. - perfo…
-
Data-analysis-on-FEC-report-of-presidential-campaign-finances-in-2016
Data-analysis-on-FEC-report-of-presidential-campaign-finances-in-2016 PublicIn this project, I performed the statistical analysis including descriptive, predictive, and prescriptive analysis on Federal Election Commission report. “The Federal Election Commission (FEC) is a…
-
Shadow-brokers-Vs.-Artificial-intelligence-
Shadow-brokers-Vs.-Artificial-intelligence- PublicThis study investigates a serious data breach happened for Equation Group and some partners of National Security Agency rose by shadow brokers between 2015 and 2017. Then, study evaluates available…
If the problem persists, check the GitHub status page or contact support.