As technology evolves, the threat landscape evolves. The threat landscape has changed from
mere script kiddies for fun to organised cyber crime to steal data for identity theft and
monetary gains.
It is very important to protect the business data from all kind of data breach attacks in order
to maintain the brand reputation and customer faith. New laws and governance policies
make it mandatory for organisations to protect customer data. This project talks about the
different effect of data breaches and preventive measures. This project targets mostly on the
'confidentiality' trait of the information security's CIA triad.
Table of Contents
Abstract
Chapter 1 Introduction
1.1 Background
1.2 Project Objectives
1.3 Methods Used
Chapter 2 Causes of Data Breach
Introduction
2.1 Types of data breaches
2.1.1 Well-meaning insider or Benevolent Insider
2.1.2 Malicious Insider
2.1.3 Malicious Outsider or Targeted attacks
2.2 Tools and techniques used by Malicious Outsiders or Hackers
Chapter 3: Laws & Cost of Data Breach
Introduction
3.1 UK Law & Governance
3.1.1 Data Protection Act [16]
3.1.2 Privacy and Electronic Communications Regulations [18]
3.2 Cost of data breaches
Chapter 4: Existing Security Mechanisms
Introduction
4.1 Antimalware, Antispyware & Proactive Protection [27]
4.2 Firewall [28]
4.3 IDS/IPS [29] [30]
4.4 SIEM (Security Information and Event Management) [31]
4.6 Vulnerability Scanning and patching [34]
Summary
Chapter 5: Analyze DLP Solutions to Prevent Data Breaches
Introduction
5.1 How does Data Loss Prevention system Work?
5.2 Approaches by a DLP system to prevent Data Loss [35]
5.3 Types of Data Loss Prevention Systems [36]
5.4 Architecture of Symantec Data Loss Prevention Solution
5.5 DLP Honey Pots to Detect Malicious Insiders [37]
Summary
Future scope for research
Chapter 6: Conclusion & Recommendations
Appendix A: Data Breach Log Template
Appendix B: PECR Security Breach Notification Form
References
Table of Figures
Figure 1 Four phases of a targeted attack [3]
Figure 2 Comparison of 'Types of breaches' from 2004 to 2011 [4]
Figure 3 A Remote Access Tool displaying various options available for a remote hacker
Figure 4 Types of attacks faced by organization in 2011 [13]
Figure 5 Data Breach attacks by type of industry [14]
Figure 6 The average total cost of data breach per record over five years [21]
Figure 7 The average total organisational cost of data breach over five years [26]
Figure 8 A typical Enterprise network with IPS and IDS
Figure 9 An enterprise network with IDS
Figure 10 An enterprise network with IPS
Figure 11 Architecture of RSA's SIEM solution [32]
Figure 12 A Summary of security events and vulnerable assets in RSA enVision [33]
Figure 13 Architecture of a vulnerability scanner
Figure 14 Architecture of Symantec Data Loss Prevention
- Quote paper
- Vikas Rajole (Author), 2012, Causes of Data Breaches and Preventive Measures. Data Loss Prevention, Munich, GRIN Verlag, https://www.grin.com/document/214310
-
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X. -
Upload your own papers! Earn money and win an iPhone X.