text
stringlengths
0
118
role of data security law in, 194–95
Snapchat app, 81–82
risk management, 71–75, 194–95
RockYou company, 20
Rose, Pete, 140
RSA Security, 21
Sarver v. Experian, 97–98
Schneider, Fred, 76–77
Schneier, Bruce, 67, 86, 88, 177, 178
SEC (Securities and Exchange Commission), 51
security by design, 176–89, 197. See also human-centric security measures
anticipating human problems, 185–86
balanced security measures, 182–83
changing default settings, 178–80
eliminating impossible security practices, 183–84
overview, 176–78
promoting mutual trust, 180–82
signals, 186–89
two-factor authentication, 184–85
security safeguards laws. See also data security law; HIPPA defined, 37
FIPPs, 47–48, 136
FISMA of 2002, 48
FTC Act, 50
Homeland Security Act, 48
ineffective enforcement of, 53–54
lack of compliance with, 52–53
origin of, 47–48
Privacy Act of 1974, 49–50
reasonableness approach to, 49–51
rigidity of, 52
standards approach to, 48–51
vagueness of, 51–52
Seven Basic Plots, The (Booker), 31
short-term thinking, pervasiveness of, 33
Shostack, Adam, 76–77
signals
misleading, 186–87
overview, 186
timing and frequency of, 187–89
Silk Road, 21–22
SIM (subscriber identification module) card attacks, 65–67
Smith, Brad, 104
Snapchat app, 81–82
social security numbers (SSNs), 120–22, 126–27
software designers, 87–89
Sony Pictures data breach, 24–25, 150–53
spam filters, 188
spear phishing, 174
Spokeo, Inc. v. Robins, 58
Spotify, 85–86
spyware, 147–48
SSNs (social security numbers), 120–22, 126–27
Stamos, Alex, 144
standards approach, security safeguards laws, 48–51
Starwood hotel chain, 27
Strava app, 148
Stuxnet virus, 20
subscriber identification module (SIM) card attacks, 65–67
surveillance tools, 147–48
Target data breach, 1–4, 24
Citadel Trojan horse, 3
class action lawsuits, 8
Fazio Mechanical HVAC company, 3
FireEye software, 3, 4
lawsuit settlement, 54
regulatory penalties, 8
role of human error in, 3, 14
systemic vulnerabilities, 5
ZeuS malware package, 3
TD Ameritrade, 19
Thaw, David, 131–32
Thompson, Nicholas, 143–44
TJ Maxx, 19
TJX Companies, 109–10
β€œtragic choice,” 70
transaction costs, 177
Trojan horse, 3, 173
Twitter, 85–86, 158–59
two-factor authentication, 184–85
Uber, 27
Ulbricht, Ross, 21–22
underground markets for stolen data, 21–22
unilateral authentication, 105–6, 182
US-CERT (United States Computer Emergency Readiness Team), 93
vendors, role in data breaches, 31–32
Venmo, 178–79
viruses, 76
Waldman, Ari, 133–34
Walker, Jim, 3
WannaCry ransomware, 103–4
Warning Design Guidelines, 187–88
WikiLeaks, 26–27
Wiper (Wipall) malware, 150
Wolff, Josephine, 78, 109–10
Yahoo, 26
ZeuS malware package, 3
CHAPTER 1
INTRODUCTION
CHAPTER OUTLINE