Search results
6 sty 2020 · There has been a tremendous increase in research in the area of cyber security to support cyber applications and to avoid key security threats faced by these applications.
1 sty 2023 · In this paper, we perform a comprehensive review and analysis of typical data breach incidents. We investigate threat actors, security flaws, and vulnerabilities that often lead to data...
11 mar 2023 · Emerging technologies such as cloud computing, the Internet of Things (IoT), social media, wireless communication, and cryptocurrencies are raising security concerns in cyberspace.
1 sty 2019 · Data breaches represent a permanent threat to all types of organizations. Although the types of breaches are different, the impacts are always the same. This paper focuses on analyzing over 9000 data breaches made public since 2005 that led to the loss of 11,5 billion individual records which have a significant financial and technical impact.
1 cze 2022 · Understanding what leads to a data breach involves understanding how organizations make security-relevant business decisions, how attackers choose their targets, and how systems of people and procedures fail at maintaining security.
11 mar 2024 · This study analyzes 378 press releases acknowledging a cyber security breach. It finds four response clusters that highlight how compromised organizations reveal cyberattacks to external stakeholders: (1) empathetic acknowledgment; (2) assurance of the organization’s breach-handling capability; (3) restoration of confidence; and, (4) ...
1 sty 2022 · We investigate threat actors, security flaws, and vulnerabilities that often lead to data breaches. The paper also includes the consequences of the information disclosures and lessons learned from each incident. Finally, we discuss countermeasures and challenges in preventing potential data breaches.