text
stringlengths
0
118
criminal identity theft, 113–14
cryptocurrency, 6, 21–22, 26, 158–59
Cyber Risk Analytics research, 28
cybersecurity
data security vs., 9
defined, 131–32
CyLab Guidelines, 187–88
CyTech Services, 128–29
Dark Web, 21–22
data breaches. See also harm from data breaches
Adobe, 24
AMCA, 28
Anthem, 59
Ashley Madison, 25, 59, 146–47
back door vs. front door breaches, 137–39
Bank of America, 18–19
Bank of New York Mellon, 19
bloated databases, 32
Card Systems Solutions, 18–19
careless mistakes, 34
ChoicePoint breach, 18–19, 38–39
Citigroup, 18–19
Dark Web, 21–22
Democratic Party, 26–27
devices, 32
Dorn VAMC, 35–37
Dropbox, 23
DSW, 18–19
Epsilon, 21
Equifax, 27, 93–95
EU e-Privacy directive, 20
Evernote, 104–5
Experian, 25–26
β€œhacktivism,” 20, 26–27
Hannaford Brothers, 19
Heartland Payment Systems, 20
Home Depot breach, 24
human error and, 31
identity theft, 25
impact on consumers, 20
it-won’t-happen-to-me attitude, 33
JP Morgan Chase, 24
lack of encryption, 33
LinkedIn, 22–23
Marriott, 27
OPM, 128–31
overview, 17–18
β€œPanama Papers” breach, 26
personal harm caused by, 24
phishing, 33
Premera Blue Cross, 25
prescription drug abuse database of Virginia, 20
Privacy Rights Clearinghouse, 28
ransomware, 23–24, 25, 26, 28
RockYou company, 20
RSA Security, 21
short-term thinking, 33
Silk Road, 21–22
Sony Pictures, 24–25, 150–53
Stuxnet virus, 20
Target, 1–4, 24, 54
TD Ameritrade, 19
TJ Maxx, 19
TJX Companies, 109–10
2005–2018, 29t, 30f
Uber, 27
UK NHS, 71–72
underground markets for stolen data, 21–22
vendors and, 31–32
Yahoo, 26
DataBreaches website, 149
data hygiene, 76
data mapping, 156–57
data minimization, 146–47, 156
data protection, defined, 132
data security law, 134. See also breach notification laws; FTC; personal data security law
blaming the breached, 11, 12
checklist approach, 195–96
CIA triad, 74–75, 137
class action lawsuits, 7–8
creating incentives for compliance, 193–94
designing human-centric security measures, 14, 197–98
digital technology exceptionalism, 195
FIPPs, 47–48, 136
HEW report, 136
HIPAA, 9, 40, 42, 49, 52, 116, 142
in holistic data security, 75–76, 77–80
imposing responsibility and accountability, 194–95
ineffectiveness of, 8–9
integration of privacy and security, 196–97
laws that accommodate human behavior, 160–61
OECD Privacy Guidelines, 136
privacy and, 9–10
proactive vs. reactive approaches, 192–93
reducing harm of breaches with, 195
regulatory penalties, 8
security by design, 197
as systemic and societal problem, 194
DDoS (distributed denial-of-service) attacks
Dyn, 85–86