SoK: Anatomy of Data Breaches

We systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasi...

Full description

Bibliographic Details
Main Authors: Saleem Hamza, Naveed Muhammad
Format: Article
Language:English
Published: Sciendo 2020-10-01
Series:Proceedings on Privacy Enhancing Technologies
Subjects:
Online Access:https://doi.org/10.2478/popets-2020-0067
id doaj-b87de909a6694cf78f8ca7707667cb1c
record_format Article
spelling doaj-b87de909a6694cf78f8ca7707667cb1c2021-09-05T14:01:11ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842020-10-012020415317410.2478/popets-2020-0067popets-2020-0067SoK: Anatomy of Data BreachesSaleem Hamza0Naveed Muhammad1University of Southern CaliforniaUniversity of Southern CaliforniaWe systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent. We researched such steps to develop complete breach workflows; as such, our workflows provide descriptions of data breaches that were previously unavailable. For generalizability, we present a general workflow of 50 data breaches from 2015. Based on our data breach analysis, we develop requirements that organizations need to meet to thwart data breaches. We describe what requirements are met by existing security technologies and propose future research directions to thwart data breaches.https://doi.org/10.2478/popets-2020-0067data breach analysisdata privacysecurity defenses
collection DOAJ
language English
format Article
sources DOAJ
author Saleem Hamza
Naveed Muhammad
spellingShingle Saleem Hamza
Naveed Muhammad
SoK: Anatomy of Data Breaches
Proceedings on Privacy Enhancing Technologies
data breach analysis
data privacy
security defenses
author_facet Saleem Hamza
Naveed Muhammad
author_sort Saleem Hamza
title SoK: Anatomy of Data Breaches
title_short SoK: Anatomy of Data Breaches
title_full SoK: Anatomy of Data Breaches
title_fullStr SoK: Anatomy of Data Breaches
title_full_unstemmed SoK: Anatomy of Data Breaches
title_sort sok: anatomy of data breaches
publisher Sciendo
series Proceedings on Privacy Enhancing Technologies
issn 2299-0984
publishDate 2020-10-01
description We systematize the knowledge on data breaches into concise step-by-step breach workflows and use them to describe the breach methods. We present the most plausible workflows for 10 famous data breaches. We use information from a variety of sources to develop our breach workflows, however, we emphasize that for many data breaches, information about crucial steps was absent. We researched such steps to develop complete breach workflows; as such, our workflows provide descriptions of data breaches that were previously unavailable. For generalizability, we present a general workflow of 50 data breaches from 2015. Based on our data breach analysis, we develop requirements that organizations need to meet to thwart data breaches. We describe what requirements are met by existing security technologies and propose future research directions to thwart data breaches.
topic data breach analysis
data privacy
security defenses
url https://doi.org/10.2478/popets-2020-0067
work_keys_str_mv AT saleemhamza sokanatomyofdatabreaches
AT naveedmuhammad sokanatomyofdatabreaches
_version_ 1717810635382718464