ResearchSpace

The world is polluted with leaked cyber data

Show simple item record

dc.contributor.author Burke, Ivan D
dc.contributor.author Van Heerden, Renier P
dc.date.accessioned 2017-11-10T09:58:57Z
dc.date.available 2017-11-10T09:58:57Z
dc.date.issued 2017-10
dc.identifier.citation Burke, I.D. and Van Heerden, R.P. 2017. The world is polluted with leaked cyber data. International Journal of Cyber Warfare and Terrorism, vol. 7(4): 35-50 en_US
dc.identifier.issn 1947-3435
dc.identifier.uri https://www.igi-global.com/viewtitlesample.aspx?id=190590&ptid=158588&t=the+world+is+polluted+with+leaked+cyber+data
dc.identifier.uri DOI: 10.4018/IJCWT.2017100104
dc.identifier.uri http://hdl.handle.net/10204/9755
dc.description Copyright: IGI Global. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website. en_US
dc.description.abstract Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated. en_US
dc.language.iso en en_US
dc.publisher IGI Global en_US
dc.relation.ispartofseries Worklist;19664
dc.subject Data Breach en_US
dc.subject Personally Identifiable Information en_US
dc.subject Personal Health Information en_US
dc.title The world is polluted with leaked cyber data en_US
dc.type Article en_US
dc.identifier.apacitation Burke, I. D., & Van Heerden, R. P. (2017). The world is polluted with leaked cyber data. http://hdl.handle.net/10204/9755 en_ZA
dc.identifier.chicagocitation Burke, Ivan D, and Renier P Van Heerden "The world is polluted with leaked cyber data." (2017) http://hdl.handle.net/10204/9755 en_ZA
dc.identifier.vancouvercitation Burke ID, Van Heerden RP. The world is polluted with leaked cyber data. 2017; http://hdl.handle.net/10204/9755. en_ZA
dc.identifier.ris TY - Article AU - Burke, Ivan D AU - Van Heerden, Renier P AB - Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated. DA - 2017-10 DB - ResearchSpace DP - CSIR KW - Data Breach KW - Personally Identifiable Information KW - Personal Health Information LK - https://researchspace.csir.co.za PY - 2017 SM - 1947-3435 T1 - The world is polluted with leaked cyber data TI - The world is polluted with leaked cyber data UR - http://hdl.handle.net/10204/9755 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record