SoK: Anatomy of Data Breaches
We systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasi...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2020-10-01
|
Series: | Proceedings on Privacy Enhancing Technologies |
Subjects: | |
Online Access: | https://doi.org/10.2478/popets-2020-0067 |