SoK: Anatomy of Data Breaches

We systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasi...

Full description

Bibliographic Details
Main Authors: Saleem Hamza, Naveed Muhammad
Format: Article
Language:English
Published: Sciendo 2020-10-01
Series:Proceedings on Privacy Enhancing Technologies
Subjects:
Online Access:https://doi.org/10.2478/popets-2020-0067