期刊文献+
共找到41篇文章
< 1 2 3 >
每页显示 20 50 100
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
1
作者 Dominik Molitor Aditya Saharia +1 位作者 Viju Raghupathi Wullianallur Raghupathi 《Journal of Information Security》 2024年第2期168-195,共28页
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This... Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents. 展开更多
关键词 Cyber Security Information Security data breaches Descriptive Analytics PRIVACY Visualization Visual Analytics
下载PDF
Organizational Data Breach:Building Conscious Care Behavior in Incident Response
2
作者 Adlyn Adam Teoh Norjihan Binti Abdul Ghani +3 位作者 Muneer Ahmad Nz Jhanjhi Mohammed A.Alzain Mehedi Masud 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期505-515,共11页
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas o... Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas of information security,incident response,theory of planned behaviour,and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation.The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date,the 2018 SingHealth data breach.The single in-depth case study observed information security awareness,policy,experience,attitude,subjective norms,perceived behavioral control,threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling.The data analysis did not support threat severity relationship with conscious care behaviour.The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management. 展开更多
关键词 End user computing organizational behavior incident response data breach computer emergency response team cyber-attack
下载PDF
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
3
作者 Chevroen Washington Phillip Yarbrough +3 位作者 Shavon Parker Rafia Islam Vishnu Vardhan Patamsetti Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2022年第2期15-30,共16页
This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to... This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to an increase in information assurance. The hypothesis is tested using data from the United States Department of Health and Human Services data breach notification repository during January 2018-December 2020. Our result shows that without the increased mitigation of information assurance, data breaches in the human service sector will continue to increase. 展开更多
关键词 Information Assurance Ransomware data breach HACKER HIPPA PHISHING Department of Health and Human Services
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
4
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity breaches data breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
Understanding the Importance of Effective Third-Party Risk Management on Data Governance
5
作者 Marios E.Menexiadis Michail Ch.Xanthopoulos 《Management Studies》 2023年第6期307-311,共5页
With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaboratio... With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaborations offer numerous benefits,they also introduce a range of risks that organizations must carefully mitigate.If the obligation to meet the regulatory requirements is added to the equation,mitigating the third-party risk related to data governance,becomes one of the biggest challenges. 展开更多
关键词 third-party risk data governance data breach internal control system risk mitigation
下载PDF
美国数据泄露通知制度研究
6
作者 于增尊 王羽 《红河学院学报》 2024年第3期119-123,129,共6页
为应对日益频繁的数据泄露事件,具有及时止损功能的数据泄露通知制度逐渐受到各法治国家的重视。美国是世界上最早确立数据泄露通知制度的国家,截至2018年,其50个州均颁布了数据泄露通知法,内容涉及触发条件、通知流程、处罚机制等诸多... 为应对日益频繁的数据泄露事件,具有及时止损功能的数据泄露通知制度逐渐受到各法治国家的重视。美国是世界上最早确立数据泄露通知制度的国家,截至2018年,其50个州均颁布了数据泄露通知法,内容涉及触发条件、通知流程、处罚机制等诸多方面。通过对美国各州立法的考察,可以为我国的数据泄露通知制度立法提供借鉴。在立法模式层面,国家应出台详尽的数据泄露通知规范;在立法理念层面,应在保护消费者权益的同时兼顾数据处理者的利益;在立法技术层面,应当从触发条件、通知流程、处罚机制等方面制定系统完善的数据泄露通知规则。 展开更多
关键词 数据泄露 数据泄露通知 美国 数据安全法 个人信息保护法
下载PDF
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
7
作者 Binita Saha Zahid Anwar 《Journal of Information Security》 2024年第1期24-39,共16页
Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, ... Technological shifts—coupled with infrastructure, techniques, and applications for big data—have created many new opportunities, business models, and industry expansion that benefit entrepreneurs. At the same time, however, entrepreneurs are often unprepared for cybersecurity needs—and the policymakers, industry, and nonprofit groups that support them also face technological and knowledge constraints in keeping up with their needs. To improve the ability of entrepreneurship research to understand, identify, and ultimately help address cybersecurity challenges, we conduct a literature review on the state of cybersecurity. The research highlights the necessity for additional investigation to aid small businesses in securing their confidential data and client information from cyber threats, thereby preventing the potential shutdown of the business. 展开更多
关键词 ENTREPRENEURSHIP CYBERSECURITY Small and Medium Businesses data breach HACKING Security
下载PDF
个人信息泄露风险损害的赔偿责任
8
作者 时诚 《现代法学》 北大核心 2024年第2期136-150,共15页
《个人信息保护法》第69条确立了侵害个人信息权益损害赔偿的请求权基础,但并未明确规定应予救济的损害类型。当个人信息泄露并未实际造成次生损害时,其侵害后果具有无形性、不确定性、风险导向性,统一损害概念难以完全涵盖,有必要重构... 《个人信息保护法》第69条确立了侵害个人信息权益损害赔偿的请求权基础,但并未明确规定应予救济的损害类型。当个人信息泄露并未实际造成次生损害时,其侵害后果具有无形性、不确定性、风险导向性,统一损害概念难以完全涵盖,有必要重构原生损害概念及其赔偿责任。个人信息泄露原生损害赔偿对象并非计算差额或个人信息的市场价值减损,而是面向未来的实质性风险。风险损害应采用动态体系的评价方法,落实于第三人动机、信息敏感性、安全技术措施、滥用证据等要素,其结论取决于诸要素协动后的综合权衡。风险损害的赔偿范围包括风险预防费用、使用利益丧失、内心焦虑损害、维权合理开支等,应建立其数额量化的酌定因素和区间。 展开更多
关键词 个人信息 数据泄露 风险损害 动态体系 酌定
下载PDF
个人信息泄露次生损害的赔偿责任
9
作者 时诚 《重庆理工大学学报(社会科学)》 2024年第5期138-151,共14页
个人信息泄露不仅可能导致受害人遭受风险与焦虑等原生损害,还会因侵权行为人实际滥用被泄露的个人信息致使其受到次生损害,具体包括算法歧视、关系控制、信息监控、身份盗窃等类型。次生损害的归责应采用相当因果关系理论,并在因果关... 个人信息泄露不仅可能导致受害人遭受风险与焦虑等原生损害,还会因侵权行为人实际滥用被泄露的个人信息致使其受到次生损害,具体包括算法歧视、关系控制、信息监控、身份盗窃等类型。次生损害的归责应采用相当因果关系理论,并在因果关系意外中断时免除个人信息处理者的赔偿责任。在第三人滥用被泄露的个人信息导致次生损害的场合,个人信息泄露的侵权样态可分为“处理者过失+第三人故意”“处理者过失+第三人过失”“处理者故意+第三人故意”三种情形,在具体场景中分别适用补充责任、连带责任、按份责任等责任形态。次生损害的赔偿范围包括积极损失和消极损失,可采用净利润标准和拟制的许可使用费标准计算获益赔偿,并在实际损失和获益数额难以确定时由法官酌定其赔偿数额。 展开更多
关键词 个人信息 数据泄露 次生损害 损害赔偿
下载PDF
数据交易违约可得利益的类型化研究
10
作者 高郦梅 《财经法学》 2024年第2期37-51,共15页
根据交易的给付特征和目的,数据交易合同的基本类型可以分为以提供财产为主要内容的数据许可合同和以提供数据技术服务为主要内容的数据服务合同。不同类型的数据交易合同在可得利益的认定和计算上存在差异。以提供财产为主要内容的数... 根据交易的给付特征和目的,数据交易合同的基本类型可以分为以提供财产为主要内容的数据许可合同和以提供数据技术服务为主要内容的数据服务合同。不同类型的数据交易合同在可得利益的认定和计算上存在差异。以提供财产为主要内容的数据许可交易主要适用市场价格法和替代交易法,当二者都难以适用时,可以考虑引入合理许可费标准。以提供技术服务为主要内容的数据服务具有鲜明的定制化属性,尚不具备普遍适用市场价格法的条件,更可能的选择是以替代交易法为基础、以获利返还法为补充。数据许可和数据服务违约可得利益的酌定赔偿数额都需要注重对数据产品或服务的性质、违约金条款以及合比例性的考量。 展开更多
关键词 数据交易 违约损害赔偿 可得利益 市场价格法 替代交易法
下载PDF
总体国家安全观下教育数据安全治理体系的反思与完善 被引量:4
11
作者 马其家 刘飞虎 《南昌大学学报(人文社会科学版)》 2023年第1期119-128,共10页
数据安全是教育信息化的根基和保障,推进教育信息化应平衡教育数据的发展和安全。教育数据滥用不仅威胁个人隐私和教育管理秩序,在总体国家安全观视域下也会引发政治、经济等领域安全风险。当前,我国教育数据安全治理体系中存在规则混... 数据安全是教育信息化的根基和保障,推进教育信息化应平衡教育数据的发展和安全。教育数据滥用不仅威胁个人隐私和教育管理秩序,在总体国家安全观视域下也会引发政治、经济等领域安全风险。当前,我国教育数据安全治理体系中存在规则混乱、缺失、冲突等问题,需要采用整体视角和运用法治思维对三个关键维度的规则进行完善,以形成统筹协调的治理体系:首先应明确教育数据基础共性标准和安全技术标准,在识别重要数据、个人数据的基础上修正数据安全管理制度;其次应赋予教育数据控制者、处理者以数据安全保护义务,并丰富其义务形式;最后应区分泄露个人数据、非个人数据的不同法律责任,构建教育数据泄露多元追责路径,并设置法定免责条款。实施教育数据安全治理有利于实现兼顾维护总体国家安全与释放教育数据价值的治理目标,切实推动教育现代化高效可持续发展。 展开更多
关键词 教育数据 政务数据开放 总体国家安全观 数据泄露 安全治理
下载PDF
Modeling Cyber Loss Severity Using a Spliced Regression Distribution with Mixture Components
12
作者 Meng Sun 《Open Journal of Statistics》 2023年第4期425-452,共28页
Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the... Cyber losses in terms of number of records breached under cyber incidents commonly feature a significant portion of zeros, specific characteristics of mid-range losses and large losses, which make it hard to model the whole range of the losses using a standard loss distribution. We tackle this modeling problem by proposing a three-component spliced regression model that can simultaneously model zeros, moderate and large losses and consider heterogeneous effects in mixture components. To apply our proposed model to Privacy Right Clearinghouse (PRC) data breach chronology, we segment geographical groups using unsupervised cluster analysis, and utilize a covariate-dependent probability to model zero losses, finite mixture distributions for moderate body and an extreme value distribution for large losses capturing the heavy-tailed nature of the loss data. Parameters and coefficients are estimated using the Expectation-Maximization (EM) algorithm. Combining with our frequency model (generalized linear mixed model) for data breaches, aggregate loss distributions are investigated and applications on cyber insurance pricing and risk management are discussed. 展开更多
关键词 Cyber Risk data breach Spliced Regression Model Finite Mixture Distribu-tion Cluster Analysis Expectation-Maximization Algorithm Extreme Value Theory
下载PDF
Cybersecurity and Artificial Intelligence Dispute Resolution: From Contention to Synergy
13
作者 Paul J.Morrow 《International Relations and Diplomacy》 2023年第5期195-203,共9页
This paper explores the dimensions of resolving disputes in cybersecurity and uses the Federal Arbitration Statute and the Courts to bind the parties to their contracts.The paper explores artificial intelligence and t... This paper explores the dimensions of resolving disputes in cybersecurity and uses the Federal Arbitration Statute and the Courts to bind the parties to their contracts.The paper explores artificial intelligence and the nuances of legal issues that potentially could arise and applies dispute resolution modalities to help businesses become more productive as opposed to being mired down in litigation,creating an efficient path forward.Reading this paper is worth your time because:(1)you will learn how to use the court system to achieve good results in cybersecurity and artificial intelligence disputes applying the Federal Arbitration Statute;(2)you will become more efficient many times over;(3)with so many disputes and so little time,and inflation having increased the cost of doing business,we can ill afford to waste money.Finding solutions that have the full authority of the courts,without going through litigation,is essential to profitability.The need is great to stop fighting and start mending.The method prescribed in this paper solves problems with the support of a court judgment without the entanglement and the expense of litigation. 展开更多
关键词 CYBERSECURITY data breaches corporate policy social media cyber management
下载PDF
论数据泄露通知义务的制度构造 被引量:2
14
作者 辜凌云 《科技与法律(中英文)》 2023年第3期37-46,86,共11页
数据泄露通知义务不仅是数据安全保障义务的次生性规范,更是个人数据主体知情权与决定权对应的告知义务所映射的独立性要求,其实质是融入实体法的管理性义务规范。因此,数据泄露通知义务本质上既属于安全价值对应的公法义务,又属于自由... 数据泄露通知义务不仅是数据安全保障义务的次生性规范,更是个人数据主体知情权与决定权对应的告知义务所映射的独立性要求,其实质是融入实体法的管理性义务规范。因此,数据泄露通知义务本质上既属于安全价值对应的公法义务,又属于自由价值对应的私权保护规范,其制度设计亦会反向促使义务主体不断更新数字密码技术手段,完善数据加密实践,逐步形成“事前—事中—事后”的协同数据安全防范机制。数据泄露通知义务的制度构造实现了通知行为触发三方(“一点”贯穿“三线”)共同介入风险分摊的有效机制,有利于缓和规则抽象性和监管具象性需求之间的矛盾。对于数据安全事件的治理,应当以数据泄露通知为连接点实现多方共治的安全防范协同机制,强化数据泄露的管理过程控制和深度利用治理。 展开更多
关键词 数据泄露通知 强制性义务 公私法融合 制度构造 规范价值
下载PDF
ARM NEON和国密SM4的H.264视频加密
15
作者 韩超 周骅 赵麒 《单片机与嵌入式系统应用》 2023年第3期60-63,共4页
针对视频数据全加密过程中的低效率和只对部分帧加密导致数据泄露问题,采用国密算法SM4逐帧加密H.264格式的I帧、P帧、B帧,同时使用NEON技术加速SM4算法。逐帧加密在防止视频数据泄露方面效果较好,使用NEON之后,SM4加密耗时减少了40%左右。
关键词 数据泄露 逐帧加密 视频加密 NEON SM4
下载PDF
数据安全的集约管理及应用——数据安全管理平台的本地落地实践
16
作者 丘靖 《科学与信息化》 2023年第17期193-195,共3页
随着数字化进程的迅猛推进,数字技术已向行业全方位加速渗透、融合。数字化程度越高,数据安全风险暴露面、攻击面越广。中国电信股份有限公司上海分公司数据安全管理平台工作的成果,对推动行业数据安全风险防控和合规建设将有相当的边... 随着数字化进程的迅猛推进,数字技术已向行业全方位加速渗透、融合。数字化程度越高,数据安全风险暴露面、攻击面越广。中国电信股份有限公司上海分公司数据安全管理平台工作的成果,对推动行业数据安全风险防控和合规建设将有相当的边际效益潜力可挖。本文就上述内容展开讨论。 展开更多
关键词 数据安全 数据识别 数据分类分级 数据泄露
下载PDF
大数据视野下的数据泄露与安全管理——基于90个数据泄露事件的分析 被引量:34
17
作者 董杨慧 谢友宁 《情报杂志》 CSSCI 北大核心 2014年第11期154-158,共5页
伴随着大数据时代的到来,数据泄露事件层出不穷,数据泄露的规模与范围也在迅速扩大。数据泄露在为企业带来财产损失、信誉风险的同时,也使得个人隐私的保护受到巨大的挑战。作者在搜集90条数据泄露事件的基础上,对这些泄露事件的数据特... 伴随着大数据时代的到来,数据泄露事件层出不穷,数据泄露的规模与范围也在迅速扩大。数据泄露在为企业带来财产损失、信誉风险的同时,也使得个人隐私的保护受到巨大的挑战。作者在搜集90条数据泄露事件的基础上,对这些泄露事件的数据特征进行了整理和分析,阐述了数据泄露带来的影响,并提出应对数据泄露的安全管理策略。 展开更多
关键词 数据泄露 信息安全 个人隐私 数据泄露事件 大数据
下载PDF
针对数据泄漏行为的恶意软件检测 被引量:16
18
作者 王丽娜 谈诚 +1 位作者 余荣威 尹正光 《计算机研究与发展》 EI CSCD 北大核心 2017年第7期1537-1548,共12页
高级可持续威胁(advanced persistent threat,APT)级网络攻击对企业和政府的数据保护带来了极大的挑战.用0day漏洞制作恶意软件来进行攻击是APT级网络攻击的常用途径,传统基于特征的安全系统很难检测这类攻击.为了检测泄漏敏感信息的恶... 高级可持续威胁(advanced persistent threat,APT)级网络攻击对企业和政府的数据保护带来了极大的挑战.用0day漏洞制作恶意软件来进行攻击是APT级网络攻击的常用途径,传统基于特征的安全系统很难检测这类攻击.为了检测泄漏敏感信息的恶意软件,首先分析已出现的APT恶意软件,描绘出窃取信息的攻击步骤,以此为基础提出1个针对数据泄漏行为的恶意软件检测方案用于检测同种攻击类型的恶意软件.该方案结合异常检测和误用检测,对被保护的主机和网络进行低开销的持续监控,同时提出一系列推断规则来描述攻击步骤中可以观察到的高级恶意事件.一旦监控到可疑事件,进一步收集主机和网络的低级行为,根据推断规则关联低级行为和高级恶意事件,据此重构窃取信息的攻击步骤,从而检测出攻击的存在.通过仿真实验验证了该方案的有效性. 展开更多
关键词 信息泄漏 恶意软件 攻击步骤 低级行为 高级恶意事件 推断规则
下载PDF
A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats 被引量:1
19
作者 Yussuf Ahmed A.Taufiq Asyhari Md Arafatur Rahman 《Computers, Materials & Continua》 SCIE EI 2021年第5期2497-2513,共17页
The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex... The number of cybersecurity incidents is on the rise despite significant investment in security measures.The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks.This is primarily due to the sophistication of the attacks and the availability of powerful tools.Interconnected devices such as the Internet of Things(IoT)are also increasing attack exposures due to the increase in vulnerabilities.Over the last few years,we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks.Edge technology brings processing power closer to the network and brings many advantages,including reduced latency,while it can also introduce vulnerabilities that could be exploited.Smart cities are also dependent on technologies where everything is interconnected.This interconnectivity makes them highly vulnerable to cyber-attacks,especially by the Advanced Persistent Threat(APT),as these vulnerabilities are amplified by the need to integrate new technologies with legacy systems.Cybercriminals behind APT attacks have recently been targeting the IoT ecosystems,prevalent in many of these cities.In this paper,we used a publicly available dataset on Advanced Persistent Threats(APT)and developed a data-driven approach for detecting APT stages using the Cyber Kill Chain.APTs are highly sophisticated and targeted forms of attacks that can evade intrusion detection systems,resulting in one of the greatest current challenges facing security professionals.In this experiment,we used multiple machine learning classifiers,such as Naïve Bayes,Bayes Net,KNN,Random Forest and Support Vector Machine(SVM).We used Weka performance metrics to show the numeric results.The best performance result of 91.1%was obtained with the Naïve Bayes classifier.We hope our proposed solution will help security professionals to deal with APTs in a timely and effective manner. 展开更多
关键词 Advanced persistent threat APT Cyber Kill Chain data breach intrusion detection cyber-attack attack prediction data-driven security and machine learning
下载PDF
生物特征识别安全标准化研究 被引量:2
20
作者 上官晓丽 郝春亮 +2 位作者 胡影 张骁 卢旗 《信息技术与标准化》 2022年第4期38-43,共6页
围绕生物特征识别安全风险,从生物识别特征伪造、数据泄露两个方面展开讨论,并结合国内外主要标准化组织在生物特征识别安全方面已开展的主要标准项目,探讨生物特征识别安全的标准化发展方向,为后续生物特征识别安全研究和标准化工作提... 围绕生物特征识别安全风险,从生物识别特征伪造、数据泄露两个方面展开讨论,并结合国内外主要标准化组织在生物特征识别安全方面已开展的主要标准项目,探讨生物特征识别安全的标准化发展方向,为后续生物特征识别安全研究和标准化工作提供参考。 展开更多
关键词 生物特征识别 标准化 身份鉴别 特征伪造 数据泄露 信息安全
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部