text
stringlengths
0
118
KrebsOnSecurity, 84–85
default settings, changing, 178–80
Def Con, 107
Delilah malware, 154
Democratic Party data breach, 26–27
designers, 83–89
defined, 83
device designers, 84–87
overview, 83–84
software designers, 87–89
designing human-centric security. See human-centric security measures
Destover (Wiper) malware, 150
device designers, 84–87
devices, role in data breaches, 32
digital technology exceptionalism, 106–9, 195
distributed denial-of-service attacks. See DDoS attacks
distributors, 89–93
defined, 83
malvertising, 89–90
overview, 89
platforms, 90–93
Dixon, Pam, 114
Dorn VAMC data breach, 35–37
Dropbox, 23
DSW, 18–19
Electronic Questionnaires for Investigations Processing (e-QIP) system, 129
Eli Lilly, 50
email scams, 173–74
encryption, 33, 72, 101
backdoors to, 100–1
privacy vs., 133–34
Epsilon, 21
e-QIP (Electronic Questionnaires for Investigations Processing) system, 129
Equifax, 27, 54, 90, 93–95
EU (European Union)
data protection, 132
e-Privacy directive, 20
GDPR, 9, 27, 40–41, 43, 45
Evernote, 104–5
Experian, 25–26, 97–98
exploiters, 83, 103–4
Facebook, 143–46
facilitators, 99–103
defined, 83
government entities, 100–3
overview, 99
Fair Credit Reporting Act (FCRA) of 1970, 96, 98–99, 123
Fair Information Practice Principles (FIPPs), 47–48, 136
Fazio Mechanical HVAC company, 3
FDIC (Federal Deposit Insurance Corporation), 45
Federal Communications Commission (FCC), 49–50
Federal Deposit Insurance Corporation (FDIC), 45
Federal Information Security Management Act (FISMA) of 2002, 48
Federal Trade Commission. See FTC
financial identity theft, 113
fingerprint data, OPM, 129
FIPPs (Fair Information Practice Principles), 47–48, 136
FireEye software, 3, 4
FISMA (Federal Information Security Management Act) of 2002, 48
Ford, Roger, 173
Ford Pinto, 123–24
FTC (Federal Trade Commission), 9, 49–51, 193
action against Eli Lilly, 50
Facebook fine, 145
FTC Act, 50
Gramm-Leach-Bliley Act, 51
In the Matter of TJX Companies, Inc. (2008), 50–51
NIST Special Publication 800-53, 51
settlement with Equifax, 93–95
GDPR (General Data Protection Regulation), 9, 27, 40–41, 43, 45
GLBA (Gramm-Leach-Bliley Act) of 1999, 51, 126–27
government entities, 100–3
Gramm-Leach-Bliley Act (GLBA) of 1999, 51, 126–27
Gross, Ralph, 120
Ground Control program, 139–40
Grubman Shire Meiselas & Sacks, 155
gullibility problem, 173–75
defined, 160
email scams, 173–74
phishing scams, 174–75
spear phishing, 174
Trojan horse, 173
hacking, 140–42
failure of passwords, 164–67
Moneyball β€œhack,” 139–40
β€œhacktivism,” 20, 26–27
Hannaford Brothers, 19
harm from data breaches
children’s identity theft, 115
costs to consumers, 117
costs to organizations, 116–17
credit monitoring, 122–23
criminal identity theft, 113–14
financial identity theft, 113
Identity Theft and Identity Theft and Assumption Deterrence Act (1998), 117–18
irresponsible issuers of credit, 123–26
law’s facilitation of identity theft, 119–21
medical identity theft, 114–15
overview, 111–12
reducing, 126–27