text
stringlengths 0
118
|
---|
stress and anxiety, 115β16 |
use of SSN to authenticate identity, 120β22 |
Health, Education, and Welfare (HEW) report, 136 |
Health and Human Services (HHS), 114 |
Health Insurance Portability and Accountability Act. See HIPAA |
Heartland Payment Systems, 20 |
Herley, Cormac, 181 |
HEW (Health, Education, and Welfare) report, 136 |
HHS (Health and Human Services), 114 |
HIPAA (Health Insurance Portability and Accountability Act), 49, 52, 142 |
Breach Notification Rule, 40, 42 |
correcting medical records, 116 |
HITECH Act of 2009, 40 |
holistic data security |
accountability, 77β78 |
acknowledging systemic problems, 191β92 |
CIA triad, 74β75, 137 |
cost-convenience tradeoff, 70 |
need for, 190β91 |
overview, 12β13 |
public health analogy, 76β77 |
risk management, 71β75 |
role of data security law in, 75β76, 77β80, 192β98 |
setting reasonable security goals, 68β71 |
SIM card attacks, 65β67 |
Home Depot breach, 24 |
Homeland Security Act, 48 |
Hoofnagle, Christopher, 124β25 |
Huggins v. Citibank, 125 |
human-centric security measures, 14, 158β89, 197β98. See also security by design |
bandwidth problem, 160, 164β72 |
carelessness problem, 160, 175β76 |
CIS controls, 161β62 |
gullibility problem, 160, 173β75 |
laws that accommodate human behavior, 160β61 |
overview, 158β60 |
passwords, 164β72 |
Twitter Bitcoin scam, 158β59 |
human error, role in data breaches, 3, 14, 31 |
identity theft, 25 |
childrenβs identity theft, 115 |
costs to consumers, 117 |
costs to organizations, 116β17 |
criminal identity theft, 113β14 |
criminalizing, 117β19 |
financial identity theft, 113 |
lawβs facilitation of, 119β21 |
medical identity theft, 114β15 |
stress and anxiety due to, 115β16 |
Identity Theft and Identity Theft and Assumption Deterrence Act (1998), 117β18 |
Inspector General Office (OIG), 129β30 |
integrity, 74β75, 137 |
International Standards Organization (ISO) 27001, 161 |
Interview, The (movie), 150, 151β52 |
IoT (Internet of Things), 85β86 |
ISO (International Standards Organization) 27001, 161 |
it-wonβt-happen-to-me attitude, 33 |
Johansson, Scarlett, 166 |
JP Morgan Chase, 24 |
Kafka, Franz, 28, 100 |
KeyPoint Government Solutions, 129 |
Kosseff, Jeff, 132 |
Krebs, Brian, 84β86, 99 |
LastPass password manager, 183β84 |
law and policy. See data security law |
Lazarus, David, 111β12 |
βlegally cognizable harm,β 55β59 |
liability. See responsibility and accountability |
LinkedIn, 22β23 |
litigation. See private litigation |
Luhnow, Jeff, 139β40 |
LulzSec, 20 |
Lynton, Michael, 151β52 |
malvertising, 89β90 |
malware |
Delilah, 154 |
Wiper, 150 |
ZeuS, 3 |
Marquez, Gabriel Garcia, 1 |
Marriott, 27 |
Matwyshyn, Andrea, 107 |
Maze ransomware, 28, 154 |
medical identity theft, 114β15 |
Mejdal, Sig, 139β40 |
Microsoft, 103β4 |
Minority Report (film), 7 |
Mirai botnet, 85 |
miseducators, 104β6 |
defined, 83 |
overview, 104β5 |
unilateral authentication, 105β6 |
Mitnick, Kevin, 141 |
Moneyball βhack,β 139β40 |
Mosko, Steve, 151 |
Mossack Fonseca, 26 |
Mr. Robot (TV series), 175 |
Mulligan, Deirdre, 76β77 |
National Health Service (NHS) data breach, 71β72 |
National Institute of Standards and Technology (NIST) 800-53, 51, 161 |
National Security Agency (NSA), 103 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.