dc.contributor.author |
Burke, Ivan D
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2017-11-10T09:58:57Z |
|
dc.date.available |
2017-11-10T09:58:57Z |
|
dc.date.issued |
2017-10 |
|
dc.identifier.citation |
Burke, I.D. and Van Heerden, R.P. 2017. The world is polluted with leaked cyber data. International Journal of Cyber Warfare and Terrorism, vol. 7(4): 35-50 |
en_US |
dc.identifier.issn |
1947-3435 |
|
dc.identifier.uri |
https://www.igi-global.com/viewtitlesample.aspx?id=190590&ptid=158588&t=the+world+is+polluted+with+leaked+cyber+data
|
|
dc.identifier.uri |
DOI: 10.4018/IJCWT.2017100104
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/9755
|
|
dc.description |
Copyright: IGI Global. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. |
en_US |
dc.description.abstract |
Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IGI Global |
en_US |
dc.relation.ispartofseries |
Worklist;19664 |
|
dc.subject |
Data Breach |
en_US |
dc.subject |
Personally Identifiable Information |
en_US |
dc.subject |
Personal Health Information |
en_US |
dc.title |
The world is polluted with leaked cyber data |
en_US |
dc.type |
Article |
en_US |
dc.identifier.apacitation |
Burke, I. D., & Van Heerden, R. P. (2017). The world is polluted with leaked cyber data. http://hdl.handle.net/10204/9755 |
en_ZA |
dc.identifier.chicagocitation |
Burke, Ivan D, and Renier P Van Heerden "The world is polluted with leaked cyber data." (2017) http://hdl.handle.net/10204/9755 |
en_ZA |
dc.identifier.vancouvercitation |
Burke ID, Van Heerden RP. The world is polluted with leaked cyber data. 2017; http://hdl.handle.net/10204/9755. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Burke, Ivan D
AU - Van Heerden, Renier P
AB - Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated.
DA - 2017-10
DB - ResearchSpace
DP - CSIR
KW - Data Breach
KW - Personally Identifiable Information
KW - Personal Health Information
LK - https://researchspace.csir.co.za
PY - 2017
SM - 1947-3435
T1 - The world is polluted with leaked cyber data
TI - The world is polluted with leaked cyber data
UR - http://hdl.handle.net/10204/9755
ER -
|
en_ZA |