text
stringlengths
0
118
stress and anxiety, 115–16
use of SSN to authenticate identity, 120–22
Health, Education, and Welfare (HEW) report, 136
Health and Human Services (HHS), 114
Health Insurance Portability and Accountability Act. See HIPAA
Heartland Payment Systems, 20
Herley, Cormac, 181
HEW (Health, Education, and Welfare) report, 136
HHS (Health and Human Services), 114
HIPAA (Health Insurance Portability and Accountability Act), 49, 52, 142
Breach Notification Rule, 40, 42
correcting medical records, 116
HITECH Act of 2009, 40
holistic data security
accountability, 77–78
acknowledging systemic problems, 191–92
CIA triad, 74–75, 137
cost-convenience tradeoff, 70
need for, 190–91
overview, 12–13
public health analogy, 76–77
risk management, 71–75
role of data security law in, 75–76, 77–80, 192–98
setting reasonable security goals, 68–71
SIM card attacks, 65–67
Home Depot breach, 24
Homeland Security Act, 48
Hoofnagle, Christopher, 124–25
Huggins v. Citibank, 125
human-centric security measures, 14, 158–89, 197–98. See also security by design
bandwidth problem, 160, 164–72
carelessness problem, 160, 175–76
CIS controls, 161–62
gullibility problem, 160, 173–75
laws that accommodate human behavior, 160–61
overview, 158–60
passwords, 164–72
Twitter Bitcoin scam, 158–59
human error, role in data breaches, 3, 14, 31
identity theft, 25
children’s identity theft, 115
costs to consumers, 117
costs to organizations, 116–17
criminal identity theft, 113–14
criminalizing, 117–19
financial identity theft, 113
law’s facilitation of, 119–21
medical identity theft, 114–15
stress and anxiety due to, 115–16
Identity Theft and Identity Theft and Assumption Deterrence Act (1998), 117–18
Inspector General Office (OIG), 129–30
integrity, 74–75, 137
International Standards Organization (ISO) 27001, 161
Interview, The (movie), 150, 151–52
IoT (Internet of Things), 85–86
ISO (International Standards Organization) 27001, 161
it-won’t-happen-to-me attitude, 33
Johansson, Scarlett, 166
JP Morgan Chase, 24
Kafka, Franz, 28, 100
KeyPoint Government Solutions, 129
Kosseff, Jeff, 132
Krebs, Brian, 84–86, 99
LastPass password manager, 183–84
law and policy. See data security law
Lazarus, David, 111–12
β€œlegally cognizable harm,” 55–59
liability. See responsibility and accountability
LinkedIn, 22–23
litigation. See private litigation
Luhnow, Jeff, 139–40
LulzSec, 20
Lynton, Michael, 151–52
malvertising, 89–90
malware
Delilah, 154
Wiper, 150
ZeuS, 3
Marquez, Gabriel Garcia, 1
Marriott, 27
Matwyshyn, Andrea, 107
Maze ransomware, 28, 154
medical identity theft, 114–15
Mejdal, Sig, 139–40
Microsoft, 103–4
Minority Report (film), 7
Mirai botnet, 85
miseducators, 104–6
defined, 83
overview, 104–5
unilateral authentication, 105–6
Mitnick, Kevin, 141
Moneyball β€œhack,” 139–40
Mosko, Steve, 151
Mossack Fonseca, 26
Mr. Robot (TV series), 175
Mulligan, Deirdre, 76–77
National Health Service (NHS) data breach, 71–72
National Institute of Standards and Technology (NIST) 800-53, 51, 161
National Security Agency (NSA), 103