Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword or section
Like this
11Activity
×
P. 1
2012 Data Breach Verizon

2012 Data Breach Verizon

Ratings: (0)|Views: 41,572|Likes:
Published by Kyle Wagner

More info:

Published by: Kyle Wagner on Mar 22, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

04/30/2012

pdf

text

original

 
2012 DATA BREACH INVESTIGATIONS REPORT
A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police,Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service,Police Central e-Crime Unit, and United States Secret Service.
 
TABLE OF CONTENTS
Executive Summary 2Methodology 5Classiying Incidents Using VERIS 6A Word on Sample Bias 8Results and Analysis9Demographics 102011 DBIR: Threat Event Overview 13Threat Agents 16Breach Size by Threat Agents18External Agents (98% obreaches, 99+% orecords) 19Internal Agents (4% o breaches, <1% o records) 21Partner Agents (<1% o breaches, <1% o records) 22Threat Actions23Malware (69% o breaches, 95% o records) 26Hacking (81% o breaches, 99% o records) 30Social (7% obreaches, 37% orecords)33Misuse (5% obreaches, <1% orecords) 35Physical (10% o breaches, <1% o records) 36Error (<1% obreaches, <1% orecords) 37Environmental (0% obreaches, 0% orecords)38Compromised Assets38Compromised Data 41Attack Diculty45Attack Targeting47Timespan oEvents48Breach Discovery Methods51Anti-Forensics                                                                                                   55PCI DSS 56The Impact o Data Breaches582012 DBIR: Conclusions and Recommendations61Appendix A: Examining relationships among threat actions67Appendix B: A USSS case study o large-scale “industrialized” cybercrime72About the 2012 DBIR Contributors 74Verizon RISK Team74Australian Federal Police74Dutch National High Tech Crime Unit74Irish Reporting & Inormation Security Service75Police Central e-Crime Unit75United States Secret Service 76
2012 DATA BREACH INVESTIGATIONS REPORT
For additional updates and commentary, please visit

Activity (11)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->