text
stringlengths 0
118
|
---|
Riley, Missed Alarms. |
4. |
Riley, Missed Alarms. |
5. |
Riley, Missed Alarms. |
6. |
Elizabeth A. Harris, Nicole Perlroth, For Target, the Breach Numbers Grow, New York Times, |
(Jan. 10, 2014), available athttps://www.nytimes.com/2014/01/11/business/target-breach- |
affected-70-million-customers.html?_r=0. |
7. |
Riley, Missed Alarms. |
8. |
Brian Krebs, Target Hackers Broke In Via HVAC Company, KrebsOnSecurity, (Feb. 5, 2014), |
available athttps://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/. |
9. |
Charles Riley & Jose Pagliery, Target will pay hack victims $10 million, CNN Tech Blog, (Mar. |
19, 2015), available athttp://money.cnn.com/2015/03/19/technology/security/target-data-hack- |
settlement/. |
10. |
Charles Riley & Jose Pagliery, Target will pay hack victims $10 million, CNN Tech Blog, (Mar. |
19, 2015), available athttp://money.cnn.com/2015/03/19/technology/security/target-data-hack- |
settlement/; Michael Riley et al., Missed Alarms and 40 Million Stolen Credit Card Numbers: |
How |
Target |
Blew |
It, |
Bloomberg |
News, |
(Mar. |
17, |
2014), |
https://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of- |
credit-card-data. |
11. |
Brian Krebs, Target Hackers Broke In Via HVAC Company, KrebsOnSecurity, (Feb. 5 2014), |
available athttps://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/. |
12. |
Chris Smith, Expert who first revealed massive Target hack tells us how it happened, BGR (Boy |
Genius Report), (Jan. 16, 2014), available athttp://bgr.com/2014/01/16/how-was-target-hacked/. |
13. |
Riley, Missed Alarms. |
14. |
Riley, Missed Alarms. |
15. |
Riley, Missed Alarms. |
16. |
Riley, Missed Alarms. |
17. |
Jim Daley, Expenses From the Home Depot and Target Data Breaches Surpass $500 million, |
Digital Transactions, (May 26, 2016), http://www.digitaltransactions.net/news/story/Expenses- |
From-the-Home-Depot-and-Target-Data-Breaches-Surpass-500-Million. |
18. |
Chris Smith, Expert who first revealed massive Target hack tells us how it happened, BGR (Boy |
Genius Report), (Jan. 16, 2014), available athttp://bgr.com/2014/01/16/how-was-target-hacked/. |
19. |
See Brian Krebs, Ransomware for Dummies: Anyone Can Do It, KrebsOnSecurity (Mar. 1, |
2017); Bill Brenner, 5 Ransomware as a Service (RaaS) Kits—SophosLabs Investigates, Naked |
Security (Dec. 13, 2017), https://nakedsecurity.sophos.com/2017/12/13/5-ransomware-as-a- |
service-raas-kits-sophoslabs-investigates/. |
20. |
Lily Hay Newman, Atlanta Spent $2.6M to Recover From a $52,000 Ransomware Scare, |
Wired, |
(Apr. |
23, |
2018), |
https://www.wired.com/story/atlanta-spent-26m-recover-from- |
ransomware-scare/. |
21. |
Chris Bodenner, How Easily Can Hackers Plant Evidence?, The Atlantic, (Sept. 11, 2015), |
https://www.theatlantic.com/notes/2015/09/how-easy-can-hackers-plant-evidence/404863/. |
22. |
Brian Fung, A Snapchat Security Breach Affects 4.6 Million Users. Did Snapchat Drag Its Feet |
on a Fix?, Wash. Post, (Jan. 1, 2014), https://www.washingtonpost.com/news/the- |
switch/wp/2014/01/01/a-snapchat-security-breach-affects-4-6-million-users-did-snapchat-drag- |
its-feet-on-a-fix/. |
23. |
See Bruce Schneir, Click Here to Kill Everybody: Security and Survival in a Hyper-Connected |
World (2018); Andrea Matwyshyn, The Internet of Bodies, 61 Wm. & Mary L. Rev. 77 (2019); |
Scott Peppet, Regulating the Internet of Things: First Steps Toward Managing Discrimination, |
Privacy, Security and Consent, 93 Tex. L. Rev. 85 (2014); Bryant Walker Smith, Automated |
Driving and Product Liability, Michigan State Law Review, 2017 Mich. St. L. Rev. 1 (2017). |
24. |
Elizabeth A. Harris and Nicole Perlroth, For Target, the Breach Numbers Grow, New York |
Times, (Jan. 10, 2014). |
25. |
Kevin McCoy, Target to Pay $18.5M for 2013 Data Breach that Affected 41 Million |
Consumers, USA Today, (May 23, 2017). |
26. |
Privacy Rights Clearinghouse, Data Breaches, https://www.privacyrights.org/data-breaches. |
27. |
For a helpful guide to cybersecurity, see Steve Bellovin, Thinking Security: Stopping Next |
Year’s Hackers (2016). Peter Swire has sought to make sense of the landscape of cybersecurity, |
including the proper role of law and policy, by proposing a conceptual framework based on the |
multiple layers of technology and organization that make up the Internet, sometimes referred to |
as “the stack.” See Peter Swire, A Pedagogic Cybersecurity Framework, 61 Communications of |
the ACM 23 (Oct. 2018), https://cacm.acm.org/magazines/2018/10/231364-a-pedagogic- |
cybersecurity-framework/fulltext. |
28. |
Other important data security laws include federal statutes such as the Gramm–Leach–Bliley |
Act (GLBA) and the Federal Information Security Management Act (FISMA) and state laws |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.