2020
DOI: 10.2478/popets-2020-0067
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Anatomy of Data Breaches

Abstract: We systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent. We researched such steps to develop complete breach workflows; as such, our workflows provide descriptions of data breaches that were previ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 18 publications
0
16
0
Order By: Relevance
“…Investigations revealed that the security breach had unlawfully disclosed over 3 million consumers' and about 1,000 workers' data to unauthorized parties. Along with staff employees' identities, phone numbers, postcodes, and automobile registration information, the theft included consumers' names, residences, dates of birth, marital statuses, and past payment card information (Saleem & Naveed, 2020).…”
Section: Carphone Data Breachmentioning
confidence: 99%
“…Investigations revealed that the security breach had unlawfully disclosed over 3 million consumers' and about 1,000 workers' data to unauthorized parties. Along with staff employees' identities, phone numbers, postcodes, and automobile registration information, the theft included consumers' names, residences, dates of birth, marital statuses, and past payment card information (Saleem & Naveed, 2020).…”
Section: Carphone Data Breachmentioning
confidence: 99%
“…Hence, it is crucial for SMEs to retain the control over the access to and flows of their farm data. This is also important from the perspective of potential (interstate) conflicts [36] or data breaches [38], that may affect farmers. Privacy-enhancing technologies could help to achieve this, by creating usable solutions and access control mechanisms.…”
Section: Outlook On Future Research Possibilitiesmentioning
confidence: 99%
“…Researchers consistently demonstrate privacy eroding techniques deployed in the wild [15][16][17][18][19] motivated by online advertising business models [32]. Personal data is leaked via social networks [33], third-party web scripts [34], apps [35], software development kits [36], and organizational breaches [37]. The scale of tracking motivate re-designing systems to provide privacy guarantees.…”
Section: Privacy Practicesmentioning
confidence: 99%