dc.contributor.author |
Burke, Ivan D
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2017-09-22T10:23:06Z |
|
dc.date.available |
2017-09-22T10:23:06Z |
|
dc.date.issued |
2017-06 |
|
dc.identifier.citation |
Burke, I.D. and Van Heerden, R.P. 2017. Treating personal data like digital pollution. 16th European Conference on Cyber Warfare and Security, 29-30 June 2017, Dublin, Ireland |
en_US |
dc.identifier.isbn |
978-1-5108-4519-0 |
|
dc.identifier.uri |
http://toc.proceedings.com/35467webtoc.pdf
|
|
dc.identifier.uri |
https://www.researchgate.net/profile/Ivan_Burke/publication/318111002_Treating_Personal_Data_Like_Digital_Pollution/links/595a4813aca2728a137aabce/Treating-Personal-Data-Like-Digital-Pollution.pdf
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/9593
|
|
dc.description |
Copyright: 2017 The Authors. 16th European Conference on Cyber Warfare and Security, 29-30 June 2017, Dublin, Ireland |
en_US |
dc.description.abstract |
During the past 10 years data breaches have become more frequent than ever. Large volumes of personal and corporate data are being leaked via these breaches. The corporate responses to these breaches, as well as, the remediation of these breaches are often not sufficient. Similarly to how production companies should be taken to task for polluting the physical environment due to bad business practices, IT institutions should be made aware of their contribution to Cyber pollution. In our article we define the concept of cyber pollution as unmaintained or obsolete devices connect to the internet and corporate networks. This paper breaks down the current state of data breach disclosures within the Europe by providing statistics on large scale data breach disclosures from 2013 till 2016. This paper attempts to model the increase of threat exposure over time similar to that of pollution breaches within the physical environment. Over time small openings or vulnerabilities within systems can lead to exploitation of whole systems. By modelling these breaches as pollution we aim to make the concept of cyber pollution a more tangible concept for IT managers to relay to staff and upper management. The model is validated using anonymised corporate network traffic and Open Source penetration testing software. |
en_US |
dc.language.iso |
en |
en_US |
dc.relation.ispartofseries |
Worklist;19239 |
|
dc.subject |
Personal data |
en_US |
dc.subject |
Digital pollution |
en_US |
dc.title |
Treating personal data like digital pollution |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Burke, I. D., & Van Heerden, R. P. (2017). Treating personal data like digital pollution. http://hdl.handle.net/10204/9593 |
en_ZA |
dc.identifier.chicagocitation |
Burke, Ivan D, and Renier P Van Heerden. "Treating personal data like digital pollution." (2017): http://hdl.handle.net/10204/9593 |
en_ZA |
dc.identifier.vancouvercitation |
Burke ID, Van Heerden RP, Treating personal data like digital pollution; 2017. http://hdl.handle.net/10204/9593 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Burke, Ivan D
AU - Van Heerden, Renier P
AB - During the past 10 years data breaches have become more frequent than ever. Large volumes of personal and corporate data are being leaked via these breaches. The corporate responses to these breaches, as well as, the remediation of these breaches are often not sufficient. Similarly to how production companies should be taken to task for polluting the physical environment due to bad business practices, IT institutions should be made aware of their contribution to Cyber pollution. In our article we define the concept of cyber pollution as unmaintained or obsolete devices connect to the internet and corporate networks. This paper breaks down the current state of data breach disclosures within the Europe by providing statistics on large scale data breach disclosures from 2013 till 2016. This paper attempts to model the increase of threat exposure over time similar to that of pollution breaches within the physical environment. Over time small openings or vulnerabilities within systems can lead to exploitation of whole systems. By modelling these breaches as pollution we aim to make the concept of cyber pollution a more tangible concept for IT managers to relay to staff and upper management. The model is validated using anonymised corporate network traffic and Open Source penetration testing software.
DA - 2017-06
DB - ResearchSpace
DP - CSIR
KW - Personal data
KW - Digital pollution
LK - https://researchspace.csir.co.za
PY - 2017
SM - 978-1-5108-4519-0
T1 - Treating personal data like digital pollution
TI - Treating personal data like digital pollution
UR - http://hdl.handle.net/10204/9593
ER -
|
en_ZA |