text
stringlengths 0
118
|
---|
criminal identity theft, 113β14 |
cryptocurrency, 6, 21β22, 26, 158β59 |
Cyber Risk Analytics research, 28 |
cybersecurity |
data security vs., 9 |
defined, 131β32 |
CyLab Guidelines, 187β88 |
CyTech Services, 128β29 |
Dark Web, 21β22 |
data breaches. See also harm from data breaches |
Adobe, 24 |
AMCA, 28 |
Anthem, 59 |
Ashley Madison, 25, 59, 146β47 |
back door vs. front door breaches, 137β39 |
Bank of America, 18β19 |
Bank of New York Mellon, 19 |
bloated databases, 32 |
Card Systems Solutions, 18β19 |
careless mistakes, 34 |
ChoicePoint breach, 18β19, 38β39 |
Citigroup, 18β19 |
Dark Web, 21β22 |
Democratic Party, 26β27 |
devices, 32 |
Dorn VAMC, 35β37 |
Dropbox, 23 |
DSW, 18β19 |
Epsilon, 21 |
Equifax, 27, 93β95 |
EU e-Privacy directive, 20 |
Evernote, 104β5 |
Experian, 25β26 |
βhacktivism,β 20, 26β27 |
Hannaford Brothers, 19 |
Heartland Payment Systems, 20 |
Home Depot breach, 24 |
human error and, 31 |
identity theft, 25 |
impact on consumers, 20 |
it-wonβt-happen-to-me attitude, 33 |
JP Morgan Chase, 24 |
lack of encryption, 33 |
LinkedIn, 22β23 |
Marriott, 27 |
OPM, 128β31 |
overview, 17β18 |
βPanama Papersβ breach, 26 |
personal harm caused by, 24 |
phishing, 33 |
Premera Blue Cross, 25 |
prescription drug abuse database of Virginia, 20 |
Privacy Rights Clearinghouse, 28 |
ransomware, 23β24, 25, 26, 28 |
RockYou company, 20 |
RSA Security, 21 |
short-term thinking, 33 |
Silk Road, 21β22 |
Sony Pictures, 24β25, 150β53 |
Stuxnet virus, 20 |
Target, 1β4, 24, 54 |
TD Ameritrade, 19 |
TJ Maxx, 19 |
TJX Companies, 109β10 |
2005β2018, 29t, 30f |
Uber, 27 |
UK NHS, 71β72 |
underground markets for stolen data, 21β22 |
vendors and, 31β32 |
Yahoo, 26 |
DataBreaches website, 149 |
data hygiene, 76 |
data mapping, 156β57 |
data minimization, 146β47, 156 |
data protection, defined, 132 |
data security law, 134. See also breach notification laws; FTC; personal data security law |
blaming the breached, 11, 12 |
checklist approach, 195β96 |
CIA triad, 74β75, 137 |
class action lawsuits, 7β8 |
creating incentives for compliance, 193β94 |
designing human-centric security measures, 14, 197β98 |
digital technology exceptionalism, 195 |
FIPPs, 47β48, 136 |
HEW report, 136 |
HIPAA, 9, 40, 42, 49, 52, 116, 142 |
in holistic data security, 75β76, 77β80 |
imposing responsibility and accountability, 194β95 |
ineffectiveness of, 8β9 |
integration of privacy and security, 196β97 |
laws that accommodate human behavior, 160β61 |
OECD Privacy Guidelines, 136 |
privacy and, 9β10 |
proactive vs. reactive approaches, 192β93 |
reducing harm of breaches with, 195 |
regulatory penalties, 8 |
security by design, 197 |
as systemic and societal problem, 194 |
DDoS (distributed denial-of-service) attacks |
Dyn, 85β86 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.