Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

executIve summary
methoDology
classifying Incidents using verIs
a Word on sample Bias
results anD analysIs
2011 DBIr: threat event overview
Breach Size by Threat Agents
External Agents (98% of breaches, 99+% of records)
Internal Agents (4% of breaches, <1% of records)
Partner Agents (<1% of breaches, <1% of records)
Malware (69% of breaches, 95% of records)
Hacking (81% of breaches, 99% of records)
Social (7% of breaches, 37% of records)
Misuse (5% of breaches, <1% of records)
Physical (10% of breaches, <1% of records)
Error (<1% of breaches, <1% of records)
Environmental (0% of breaches, 0% of records)
Breach Discovery methods
the Impact of Data Breaches
2012 DBIr: conclusIons anD recommenDatIons
appenDIx a: examInIng relatIonshIps among threat actIons
appenDIx B: a usss case stuDy of large-scale “InDustrIalIzeD” cyBercrIme
aBout the 2012 DBIr contrIButors
Dutch national high tech crime unit
Irish reporting & Information security service
police central e-crime unit
united states secret service
P. 1
Verizon Data Breach Investigations Report 2012

Verizon Data Breach Investigations Report 2012

Ratings: (0)|Views: 31 |Likes:

More info:

Categories:Types, Research
Published by: Julio Graziano Pontes on Sep 11, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/14/2013

pdf

text

original

You're Reading a Free Preview
Pages 5 to 51 are not shown in this preview.
You're Reading a Free Preview
Pages 56 to 80 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->