2020
DOI: 10.2139/ssrn.3542567
|View full text |Cite
|
Sign up to set email alerts
|

A Case Study of the Capital One Data Breach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(22 citation statements)
references
References 0 publications
0
22
0
Order By: Relevance
“…Because of the rarity of details concerning information security management, analyzing the detailed study [2] would yield interesting insights. Their study aligns with our vision since their initial hypothesis: Renowned standards do not provide enough guidance for organizations for implementation nor incident management.…”
Section: Methodological Considerationmentioning
confidence: 99%
See 2 more Smart Citations
“…Because of the rarity of details concerning information security management, analyzing the detailed study [2] would yield interesting insights. Their study aligns with our vision since their initial hypothesis: Renowned standards do not provide enough guidance for organizations for implementation nor incident management.…”
Section: Methodological Considerationmentioning
confidence: 99%
“…Figure 5 shows the different security tasks and their responsible. Each task is the implementation of a necessary NIST security control [2]. In the case of the layoffs and human resource removal, the tasks would remain and it would be apparent that they need to be reassigned in order to maintain security controls.…”
Section: Research Questionmentioning
confidence: 99%
See 1 more Smart Citation
“…While not a direct result of AI, it demonstrates the vulnerability of cloud storage, a technology often intertwined with advanced AI deployments [5]. In addition to the immediate financial impact, data breaches can seriously undermine trust in financial institutions, and once that trust is lost, it can be very difficult to recover.…”
Section: Data Risksmentioning
confidence: 99%
“…This should also be conducted by PT Tokopedia. (Nelson Novaes, 2020) The Tokopedia data breach case was caused by the actions of a third party who broke into the Tokopedia electronic system. Thus, if it refers to Article 14 paragraph (5) Government Regulations concerning the Implementation of Electronic Systems and Transactions (PP PSTE), Tokopedia only needs to provide accountability in the form of a written notification to the owner of the personal data that there has been a failure in protecting personal data.…”
Section: Personal Data Breach In the Perspective Of Corporate Respons...mentioning
confidence: 99%