text
stringlengths
0
118
Ashley Madison, 25, 59, 146–47
authentication
bilateral, 182
two-factor, 184–85
unilateral, 105–6, 182
availability, 74–75, 137
backdoors, encryption, 100–1
Bambauer, Derek, 77, 132
bandwidth problem, 164–72
defined, 160
passwords, 164–72
Bank of America, 18–19
Bank of New York Mellon, 19
β€œBig Data,” 38
Big Data companies, 98–99
bilateral authentication, 182
Bitcoin, 6, 21–22, 26, 158–59
Black Hat, 107
bloated databases, role in data breaches, 32
BlueKai, 146
Bogost, Ian, 144–45
Booker, Christopher, 31
Bosworth, Andrew, 144
botnets, 84–85
breach notification laws, 137
beginning of, 19
β€œbreach notification fatigue,” 45
California data breach law of 2003, 39
ChoicePoint breach and, 38–39
defined, 37
FDIC, 45
GDPR, 9, 27, 40–41, 43, 45
harm requirement, 41–42
HIPAA Breach Notification Rule, 40, 42
HITECH Act of 2009, 40
inadequate protection of consumers, 44–45
notification timelines, 43, 45
private right of action, 43
rise of, 39–41
unproductive increase in costs of breach due to, 45–47
variations in, 41–43
brute force attacks, 102
β€œBurrow, The” (Kafka), 100–1
Calabresi, Guido, 70
California Privacy Rights Act (CPRA), 157
California data breach law of 2003, 39, 42
California Office of Privacy Protection, 42
Cambridge Analytica, 143–46
Cameron, David, 100
Card Systems Solutions, 18–19
carelessness problem, 160, 175–76
CPRA (California Privacy Rights Act), 157
Center for Internet Security controls. See CIS controls
Central Personnel Data File database, OPM, 129
Ceridian, 56
CFAA (Computer Fraud and Abuse Act), 87, 141
Chaney, Christopher, 164–67, 178
checklist approach, data security law, 195–96
Chekhov, Anton, 32
children’s identity theft, 115
ChoicePoint breach, 18–19, 38–39, 95
Chronicle of a Death Foretold (Marquez), 1
CIA triad, 74–75, 137
CIS (Center for Internet Security) controls, 161–62
basic, 162
foundational, 162
organizational, 162
Citadel Trojan horse, 3
Citigroup, 18–19
Citron, Danielle, 32, 147–48
Clapper v. Amnesty International USA, 56–58
Clinton, Hilary, 26–27
Clipper Chip, 100
CNN, 85–86
collective responsibility, 109–10
Comey, James, 25, 100
Computer Fraud and Abuse Act (CFAA), 87, 141
confidentiality, 74–75, 137
consumer reporting agencies, 93–98
Equifax, 93–95
Experian, 97–98
consumers
breach notification laws, 44–45
cost of identity theft, 117
harm to caused by data breaches, 117
Correa, Chris, 139–40, 142
cost-convenience tradeoff, 70
cost of data breaches, 5–7
biometric information and, 6–7
identity theft, 5–6, 116–17
malicious hackers/data manipulation, 6
physical safety risks, 6
ransomware attacks, 6
credit
FCRA, 96, 98–99, 123
irresponsible issuers of credit, 123–26
credit monitoring, 36
breach notification letters and, 41
Equifax data breach and, 95
inadequacy of, 122–23