Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
0Activity

Table Of Contents

Executive Summary
Year in Review, 2010
2011 DBIR: Methodology
Verizon Data Collection Methodology
USSS Data Collection Methodology
NHTCU Data Collection Methodology
Turning the Incident Narrative into Metrics
Demographics
Threat Agents
Breach Size by Threat Agents
Threat Actions
Assets and Attributes
Compromised Data
Attack Difculty
Attack Targeting
Timespan of Attack
Breach Discovery Methods
PCI DSS Compliance
Conclusions and Recommendations
Appendix A: Case Statistics from the Dutch High Tech Crime Unit
Appendix B: Project Taurus and the Bredolab Takedown
About Verizon Investigative Response
About the United States Secret Service
About the Dutch National High Tech Crime Unit
0 of .
Results for:
No results containing your search query
P. 1
Rp Data Breach Investigations Report 2011 en Xg

Rp Data Breach Investigations Report 2011 en Xg

Ratings: (0)|Views: 10 |Likes:
Published by Avi Legmann

More info:

Published by: Avi Legmann on Jan 26, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/26/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 33 are not shown in this preview.
You're Reading a Free Preview
Pages 37 to 74 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->